SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IEEE means...
Manages network applications
The Internet router is blocking port 25.
Institute of Electrical and Electronics Engineers
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
2. Which of the following choices describes an RJ-45 (Registered Jack) connector?
1000BASE-CX
An old microwave oven is being used in the break room which causes interference with the access point.
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Uniform Resource Locator
3. What is L2TP? What is significant about this protocol?
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Client - protocol - and adapter
1433
Networked Basic Input/Output System
4. A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning correctly and the network is up - which of the following will
The amber light is flashing occasionally and the green light is lit steadily.
514
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
Forward the packets to all ports except the one that originated the request
5. To increase the number of available IP (Internet Protocol) addresses - IPv6 (Internet Protocol version 6) uses which one of the following options?
6
128 bit addresses
Network Time Protocol
20 & 21
6. PPTP Means...
Industry Standards Organization
BootP (Boot Protocol)
Dynamic Host Configuration Protocol
Point-to-Point Tunneling Protocol
7. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) copper cable standard?
1000BASE-CX
Internet Protocol Security. This is the defacto standard for VPN security.
Lightweight Directory Access Protocol
The users will not be affected by the change.
8. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
192.168.96.254
1
Service Set Identifier
9. RDP means...
Internet connection
Remote Desktop Protocol
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Point-to-Point Tunneling Protocol
10. CPU means...
25
Easy to install - Inexpensive - Less actual cable required
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Central Processing unit
11. On what Port is NetBios?
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
135-139
12. What is UDP? What are some of its attributes?
User Datagram Protocol. This protocol is connectionless and routable.
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
MultiProtocol Label Switching
netstat
13. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Wireless LAN
rlogin
Presentation
1
14. GPS means...
IMAP (Mail Client)
Global Positioning System
Wireless Access Point
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
15. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
All workstations except Workstation 3 can communicate to each other.
Select the most probable cause
TFTP (Trivial File Transfer Protocol)
128 bit addresses
16. A Windows 2000 work station has a TCP / IP (Transmission Control Protocol / Internet Protocol) address of 169.254.12.1. Which statement describes the state of the computers TCP / IP (Transmission Control Protocol / Internet Protocol) configuration?
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Select the most probable cause
Internet mail access protocol
Server Message Block OR Small-to-Midsize Business
17. An Ethernet MAC (Media Access Control) address consists of...
SUN RPC
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
WEP (Wired Equivalent Privacy)
48 bits.
18. Which of the following connectors will be required for a RAS (Remote Access Service) server accepting four incoming dial-up connections to connect to the PSTN (Public Switched Telephone Network)?
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
SSH
Password Authentication Protocol
RJ-11 (Registered Jack)
19. On what Port is POP3?
110
Manages printers on the network
20 & 21
72.16.16.1
20. In a fully Meshed network - every node has a connection to every other node - 7+6+5+4+3+2+1=28 Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
CSU / DSU (Channel Service Unit / Data Service Unit)
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Fully Qualified Domain Name
netstat and ping
21. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
Transport
Extranet
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
22. ISO Means...
IMAP (Mail Client)
The analyzer is functioning properly.
VPN (Virtual Private Network)
Industry Standards Organization
23. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model?
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Asynchronous Transfer Mode
D. Switch and bridge
The amber light is flashing occasionally and the green light is lit steadily.
24. ICMP means...
Internet Control Message Protocol
Manages network applications
Proxy server
Proxy Server
25. FTP Means
File Transfer Protocol
Proxy Server
8080
netstat and ping
26. UDP Means...
100BASE-FX Answer: D
User Datagram Protocol
802.11i
192.168.96.254
27. A user has set up filtering on an Internet router. The local SMTP (Simple Mail Transfer Protocol) server has stopped sending or receiving messages from the Internet. What is the cause of the problem?
Token passing
SMTP Server
The Internet router is blocking port 25.
Metropolitan Area Network
28. What is IPSEC? Why is it significant?
Open Source Path First - this is a routing protocol
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
HTTPS/ SSL
Internet Protocol Security. This is the defacto standard for VPN security.
29. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial - Scientific - and Medical) band EXCEPT...
802.11a.
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
RDP/ Terminal Services
30. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
Quality of Service
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Public Switched Telephone Network
Application
31. Examples of valid WEP (Wired Equivalent Privacy) key lengths
40 bit - 128 bit - 64 bit
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
All workstations except Workstation 3 can communicate to each other.
Local Area Network
32. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
encapsulating the data payload.
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Basic Input/Output System
Manages printers on the network
33. Which one of the following devices connects a network segment to a public telephone network?
A striped set array with parity
110
Wired Equivalent Privacy
CSU / DSU (Channel Service Unit / Data Service Unit)
34. A firewall can be used to prevent which of the following?
Digital Subscriber Line
Domain Name Service OR Domain Name Server
Uniform Resource Locator
Packets from entering and leaving a network
35. Which protocol is the fastest file transfer protocol?
Trivial File Transfer Protocol
Two or more connected computers that can share resources
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
TFTP (Trivial File Transfer Protocol)
36. DHCP means...
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Dynamic Host Configuration Protocol
CSU / DSU (Channel Service Unit / Data Service Unit)
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
37. NNTP Means...
111
Network News Transfer Protocol
Bus
User Datagram Protocol
38. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Intern
6
Telnet
192.168.96.254
Network Address Translation
39. List the benefits of a bus topology
Open Source Path First - this is a routing protocol
Easy to install - Inexpensive - Less actual cable required
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Local Area Network
40. List the drawbacks of a ring topology
raphical User Interface
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Port 20 must also be unblocked.
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
41. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolve
Switches - bridges - and NICs (Network Interface Card)
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
As a way to share resources and information
42. Which one of the following options is a security standard for 802.11?
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
WEP (Wired Equivalent Privacy)
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
1000BASE-CX
43. MLI Means...
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Multiple Link Interface
Internet Information Services
Any device on the network that can ask for access to resources
44. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a...
Internet connection
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
gateway.
45. Which of the following are classified as Layer 2 devices?
CSU / DSU (Channel Service Unit / Data Service Unit)
Transmission Control Protocol
10 GBASE-LR
Switches - bridges - and NICs (Network Interface Card)
46. TCP means...
Transmission Control Protocol
111
802.11a.
3.1
47. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
An eight-position connector which uses UTP (Unshielded Twisted Pair).
1000BASE-CX
Stores and dispenses files
Handles e-mail functions
48. PKI means...
DNS
Public Key Infrastructure
Routing Internet Protocol
Proxy server
49. On what Port is the Proxy Server?
Bus
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Initial installation cost may be higher - One central single point of failure (the hub or other device)
8080
50. Which one of the following security protocols creates a secure connection over the Internet?
HTTP
Open Source Path First - this is a routing protocol
L2TP (Layer 2 Tunneling Protocol)
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance