SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which of the following are classified as Layer 2 devices?
Post Office Protocol
Multiple Link Interface
HTTPS/ SSL
Switches - bridges - and NICs (Network Interface Card)
2. This is not an IP (Internet Protocol) addresses.
72.16.16.1
Routing Information Protocol
Select the most probable cause
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
3. MAN Means...
RJ-11 (Registered Jack)
PDC (Primary Domain Controller)
Metropolitan Area Network
Proxy
4. HTML means...
135-139
SQL Server
Hypertext Markup Language
An eight-position connector which uses UTP (Unshielded Twisted Pair).
5. On what Port is SNMP?
802.11
Authentication
It is an address assigned to a NIC (Network Interface Card).
161 & 162
6. SSID Means...
Internet Control Message Protocol
Service Set Identifier
WINS (Windows Internet Name Service)
Access Control List
7. What enables a UNIX computer to access exported file systems from other UNIX computers?
NFS (Network File System)
100BASE-FX Answer: D
53
This IP (Internet Protocol) address cannot be pinged remotely.
8. WEP Means...
128 bit addresses
Wired Equivalent Privacy
Password Authentication Protocol
gateway.
9. URL Means...
Transmission Control Protocol
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Uniform Resource Locator
Basic Input/Output System
10. TFTP Means...
Trivial File Transfer Protocol
6
Hypertext transfer protocol
Stores and dispenses files
11. NIC means...
8080
In the LAN (Local Area Network)
Provides remote users with access to the network through modems and an IP connection
Network Interface Card
12. Which command generated the following output? Active Connections Proto Local Address Foreign Address State TCP CompA:3006 192.168.0.2:Microsoft Established TCP CompA:3021 192.168.0.246:HTTP Established
netstat
Internetwork Packet Exchange/Sequenced Packet Exchange
SSH
Reverse Address Resolution Protocol.
13. Web Server
In the LAN (Local Area Network)
Manages printers on the network
Point-to-Point Protocol
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
14. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
User Datagram Protocol
An old microwave oven is being used in the break room which causes interference with the access point.
Media Access Unit - Media attachment Unit
ping
15. What is on Ports 20 and 21?
Public Key Infrastructure
Point to Point Tunneling Protocol
Internet mail access protocol
These are the FTP ports. Port 20 handles data and Port 21 provides control.
16. A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)?
Integrated Services digital Network
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
MultiProtocol Label Switching
Router
17. LDAP means...
3389
Secure Sockets Layer
802.11
Lightweight Directory Access Protocol
18. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
53
ICMP (Internet Control Message Protocol)
The file has been opened by another user and is open for read only.
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
19. What is on Port 443?
DNS
161 & 162
HTTPS/ SSL
Handles tasks in the place of other machines on the network
20. GUI means
802.11b
802.2
raphical User Interface
User Datagram Protocol
21. ACL means...
Dynamic Host Configuration Protocol
Transmission Control Protocol
Access Control List
rp
22. On what Port is FTP?
Intrusion Detection System
20 & 21
There will be no Internet access.
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
23. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
Password Authentication Protocol
802.1x
10
Post Office Protocol
24. What is a MAC (Media Access Control) address?
53
It is an address assigned to a NIC (Network Interface Card).
Sys Log (Unix) or Event Manager (Windows)
ping
25. What is Unicast?
110
A network map showing exactly how data moves through the network.
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
File Transfer Protocol
26. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
3.1
Proxy server
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Transmission Control Protocol
27. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
SMTP Server
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Multipurpose Internet Mail Extension
28. LAN Local Area Network
111
All hosts can communicate.
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
1000BASE-LX and10 GBASE-LR
29. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
80
Sys Log (Unix) or Event Manager (Windows)
A. 18 -000 feet (5 -486.4 meters)
SMTP Server
30. What is on Port 25?
SMTP Server
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Network Interface Card
31. FQDN means...
Fully Qualified Domain Name
SQL Server
This IP (Internet Protocol) address cannot be pinged remotely.
25
32. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Intern
HTTPS/ SSL
192.168.96.254
Stores and dispenses files
encapsulating the data payload.
33. On what Port is SQL Server?
Point-to-Point Protocol
Internet Protocol Security. This is the defacto standard for VPN security.
Manages network applications
1433
34. WINS Means...
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
passing a username and password in plaintext.
Windows Internet Name Service
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
35. NAC means...
In a locked room in an offsite location
Remote Desktop Protocol
Network Access Control
Proxy server
36. Which one of the following is true concerning bridges and their forwarding decisions?
WEP (Wired Equivalent Privacy)
80
IMAP (Mail Client)
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
37. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point?
443
2.4 GHz (Gigahertz).
Bluetooth enabled cell phones
Public Switched Telephone Network
38. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
An exact duplicate of the infrastructure is mirrored offsite.
Global System for Mobile Communications
Light Emitting Diode
These are the FTP ports. Port 20 handles data and Port 21 provides control.
39. What is BGMP?
NFS (Network File System)
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
NetBios
Point to Point Tunneling Protocol
40. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. Which of the following options allows for secure communication over the Internet?
Light Emitting Diode
Initial installation cost may be higher - One central single point of failure (the hub or other device)
169.254.1.1
VPN (Virtual Private Network)
42. What is OSPF?
802.11
traceroute
TFTP (Trivial File Transfer Protocol)
Open Source Path First - this is a routing protocol
43. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
User Datagram Protocol. This protocol is connectionless and routable.
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Stores and dispenses files
The analyzer is functioning properly.
44. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
rp
Network Interface Card
Bluetooth enabled cell phones
45. What is DHCP? What is its key attribute?
TCP / IP (Transmission Control Protocol / Internet Protocol)
8080
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Packets from entering and leaving a network
46. Which command will produce the following output? ethoLink encap : Ethernet HWaddr: 00:80:C8:D6:74:43 inet adder : 4.150.6.3 Bcast : 4.255.255.255 Mask: 255.0.0.0
ifconfig
TCP / IP (Transmission Control Protocol / Internet Protocol)
A. 18 -000 feet (5 -486.4 meters)
Packets from entering and leaving a network
47. What is QoS?
A long length of antenna extension cable
Quality of Service
Post Office Protocol
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
48. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
The 'memo maker' that sends and receives paperless faxes over the network
TCP / IP (Transmission Control Protocol / Internet Protocol)
Point-to-Point Protocol
169.254.1.1
49. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this?
Bayonet-Neill-Concelman or British Naval Connector
Bluetooth enabled cell phones
They are connected to a switch when trying to capture packets.
SSL (Secure Sockets Layer)
50. NetBEUI Means...
53
Transmission Control Protocol
Networked Basic Input/Output System Extended User Interface
Internet Control Message Protocol