SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is NAT?
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
rlogin
Network Address Translator
WINS (Windows Internet Name Service)
2. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)?
Authentication
Internet Service Provider
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
802.11
3. Network
Two or more connected computers that can share resources
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Institute of Electrical and Electronics Engineers
111
4. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
In a locked room in an offsite location
Electromagnetic Interference
5. URL Means...
Lightweight Directory Access Protocol
Internet connection
2.4 GHz (Gigahertz).
Uniform Resource Locator
6. What enables a UNIX computer to access exported file systems from other UNIX computers?
Dynamic Host Configuration Protocol
48 bits.
8080
NFS (Network File System)
7. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial - Scientific - and Medical) band EXCEPT...
802.11a.
netstat
Transmission Control Protocol
The amber light is flashing occasionally and the green light is lit steadily.
8. File Server
All hosts can communicate.
Peer-To-Peer and Client-Server
Stores and dispenses files
Sys Log (Unix) or Event Manager (Windows)
9. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
550 meters (1 -804.46 feet)
Sys Log (Unix) or Event Manager (Windows)
Connect Workstation 6 and Workstation 2 using a barrel connector
Network and Transport
10. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
MAC (Media Access Control) address
An exact duplicate of the infrastructure is mirrored offsite.
raphical User Interface
Client - protocol - and adapter
11. Which command will produce the following output? ethoLink encap : Ethernet HWaddr: 00:80:C8:D6:74:43 inet adder : 4.150.6.3 Bcast : 4.255.255.255 Mask: 255.0.0.0
Network Access Control
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
ifconfig
12. IDS means...
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Intrusion Detection System
Verification
Local Area Network
13. Fault Tolerance
Implement VLANs (Virtual Local Area Network)
PPP (Point-to-Point Protocol)
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
TFTP (Trivial File Transfer Protocol)
14. NIC means...
Proxy server
Media Access Control
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Network Interface Card
15. What is Multicast Transmission?
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Global System for Mobile Communications
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
69
16. On what Port is TFTP?
TFTP (Trivial File Transfer Protocol)
69
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Media Access Unit - Media attachment Unit
17. MAU means...
Light Emitting Diode
Internetwork Packet Exchange/Sequenced Packet Exchange
gateway.
Media Access Unit - Media attachment Unit
18. Disk mirroring is also known as RAID ___...
Hypertext transfer protocol
Port Address Translator
1
10 GBASE-LR
19. What is DHCP? What is its key attribute?
Media Access Control
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Internet Protocol
Access Control List
20. Which one of the following options is a security standard for 802.11?
802.2
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Public Key Infrastructure
WEP (Wired Equivalent Privacy)
21. BIOS Means...
Hypertext Markup Language
Basic Input/Output System
20 & 21
netstat
22. What is IPSEC? Why is it significant?
PDC (Primary Domain Controller)
Point to Point Protocol
Internet Protocol Security. This is the defacto standard for VPN security.
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
23. What is on Port 389?
Service Set Identifier
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
24. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a...
In the LAN (Local Area Network)
gateway.
Port Address Translator
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
25. What is on Ports 161 and 162?
To decrease network congestion Answer: D
Network Access Control
Port 161 is SNMP and Port 162 is the SNMP Manager
larger subnet masks.
26. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
D. Switch and bridge
The analyzer is functioning properly.
Primary Rate Interface
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
27. DHCP means...
There will be no Internet access.
Uniform Resource Locator
Dynamic Host Configuration Protocol
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
28. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
Public Key Infrastructure
Application
nslookup
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
29. On what Port is HTTPS/ SSL?
Application
443
Metropolitan Area Network
Digital Subscriber Line
30. SSID Means...
Service Set Identifier
Multipurpose Internet Mail Extension
Bluetooth enabled cell phones
Media Access Control
31. MAN Means...
TCP / IP (Transmission Control Protocol / Internet Protocol)
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
HTTP
Metropolitan Area Network
32. On what Port is HTTP?
The 'memo maker' that sends and receives paperless faxes over the network
80
172.192.4.256
Post Office Protocol 3
33. What is a MAC (Media Access Control) address?
Integrated Services digital Network
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
MT-RJ (Mechanical Transfer-Registered Jack)
It is an address assigned to a NIC (Network Interface Card).
34. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Fully Qualified Domain Name
Presentation
35. Around noon - 802.11b wireless users near the break room have intermittent - random connections. What is the problem?
Multiple Link Interface
A network map showing exactly how data moves through the network.
100 Mbps (Megabits per second)
An old microwave oven is being used in the break room which causes interference with the access point.
36. NetBIOS Means...
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Networked Basic Input/Output System
40 bit - 128 bit - 64 bit
Port Address Translator
37. List the drawbacks of a ring topology
Any device on the network that can ask for access to resources
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Hybrid hub
53
38. NetBEUI Means...
Networked Basic Input/Output System Extended User Interface
8080
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Point to Point Protocol
39. What is EAP? What is it used for?
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
bytes 1-3
WINS (Windows Internet Name Service)
POP3
40. What is on Port 80?
Electromagnetic Interference
Alternating Current
HTTP
Secure Sockets Layer
41. What is on Port 110?
Put a router between the two network segments
POP3
25
Media Access Unit - Media attachment Unit
42. A firewall can be used to prevent which of the following?
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Packets from entering and leaving a network
Network File System
43. SSL Means...
Bluetooth enabled cell phones
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Secure Sockets Layer
8080
44. What is PPP?
Internet Control Message Protocol
Data Link
Point to Point Protocol
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
45. SSH Means...
Presentation
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
10 GBASE-LR
Secure Shell
46. A star network that uses several cable types must use which hub type in order to accommodate all client machines?
Transmission Control Protocol/Internet Protocol
Authentication
netstat and ping
Hybrid hub
47. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
CSU / DSU (Channel Service Unit / Data Service Unit)
Routing Internet Protocol
143
Physical
48. What is RIP?
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Routing Internet Protocol
Electromagnetic Interference
IMAP (Mail Client)
49. RIP Means...
Routing Information Protocol
100BASE-FX Answer: D
Provides remote users with access to the network through modems and an IP connection
Network Access Control
50. IPSEC means...
10 GBASE-LR
Internet Protocol Security
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Authentication