SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Telephony Server
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
40 bit - 128 bit - 64 bit
VPN (Virtual Private Network)
Authentication
2. POP3 Means...
SUN RPC
8080
Post Office Protocol 3
Time domain reflectometer
3. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
D. Switch and bridge
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
4. What is on Port 143?
Networked Basic Input/Output System Extended User Interface
Metropolitan Area Network
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
IMAP (Mail Client)
5. SSL Means...
Secure Sockets Layer
The device ID (Identification)
10 GBASE-LR
The Internet router is blocking port 25.
6. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
An exact duplicate of the infrastructure is mirrored offsite.
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Challenge Handshake Authentication Protocol
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
7. Which one of the following options is a security standard for 802.11?
Internet Information Services
Network Address Translation
443
WEP (Wired Equivalent Privacy)
8. All of the following Novell NetWare operating systems support NDS (NetWare Directory Services) natively EXCEPT...
3.1
Network and Transport
PDC (Primary Domain Controller)
TFTP (Trivial File Transfer Protocol)
9. IDS means...
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
Intrusion Detection System
SQL Server
An old microwave oven is being used in the break room which causes interference with the access point.
10. Which physical topology is used by a 10BASE2 network?
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Bus
Telnet
raphical User Interface
11. What is on Port 80?
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Primary Rate Interface
802.11a.
HTTP
12. MLI Means...
Hypertext transfer protocol over secure sockets layer.
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Password Authentication Protocol
Multiple Link Interface
13. What is UDP? What are some of its attributes?
User Datagram Protocol. This protocol is connectionless and routable.
Verification
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Network Address Translator
14. URL Means...
Uniform Resource Locator
Peer-To-Peer and Client-Server
NetBios
Implement VLANs (Virtual Local Area Network)
15. What is on Port 1433?
SQL Server
SMB (Server Message Block)
Intrusion Detection System
Token passing
16. Which one of the following security protocols creates a secure connection over the Internet?
L2TP (Layer 2 Tunneling Protocol)
PPTP (Point-to-Point Tunneling Protocol)
Wireless Protected Access
Global Positioning System
17. An Ethernet MAC (Media Access Control) address consists of...
48 bits.
Public Key Infrastructure
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
The Internet router is blocking port 25.
18. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
Alternating Current
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
128 bit addresses
netstat and ping
19. List the drawbacks of a star topology
Presentation
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Manages printers on the network
Periodically (randomly) blinking
20. A valid MAC (Media Access Control) address is how many bytes long?
ping
6
MT-RJ (Mechanical Transfer-Registered Jack)
Physical
21. What is a MAC (Media Access Control) address?
Internetwork packet exchange
It is an address assigned to a NIC (Network Interface Card).
Exterior Gateway Protocol
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
22. On what Port is SUN RPC?
NFS (Network File System)
111
69
169.254.1.1
23. SNMP Means...
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Simple Network Management Protocol
Verification
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
24. File Server
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Internet Service Provider
Stores and dispenses files
1000BASE-LX and10 GBASE-LR
25. ATM Means...
Secure Sockets Layer
Alternating Current
Sys Log (Unix) or Event Manager (Windows)
Asynchronous Transfer Mode
26. PKI means...
Public Key Infrastructure
raphical User Interface
443
HTTP
27. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
MT-RJ (Mechanical Transfer-Registered Jack)
Time domain reflectometer
Check the connection from the WAP (Wireless Access Point) to the network
NetBios
28. UDP Means...
netstat
Internet Protocol Security
100BASE-FX Answer: D
User Datagram Protocol
29. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link layer?
DNS
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
Open Source Path First - this is a routing protocol
802.2
30. What is L2TP? What is significant about this protocol?
Proxy server
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
IMAP (Mail Client)
The analyzer is functioning properly.
31. What is EGP?
Wired Equivalent Privacy
Exterior Gateway Protocol
Token passing
Extranet
32. A network administrator is troubleshooting a wireless LAN (Local Area Network) that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs (Wireless Access Point) from different companies within rang
Quality of Service
1000BASE-CX
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Plain Old Telephone Service
33. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. A network has grown to include seventy 24 port Ethernet switches and has decreased in performance steadily as new switches are added. What adjustments can be made to the infrastructure to improve the performance?
ifconfig
WEP (Wired Equivalent Privacy)
Implement VLANs (Virtual Local Area Network)
Network File System
35. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?
rlogin
A long length of antenna extension cable
802.11a.
Point-to-Point Protocol
36. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
550 meters (1 -804.46 feet)
The 'memo maker' that sends and receives paperless faxes over the network
Wireless LAN
53
37. NAT Means...
D. Switch and bridge
Telnet
Network Address Translation
Network News Transfer Protocol
38. What is IPSEC? Why is it significant?
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
HTTP
Network News Transfer Protocol
Internet Protocol Security. This is the defacto standard for VPN security.
39. DHCP means...
Dynamic Host Configuration Protocol
Handles e-mail functions
User Datagram Protocol
Multiple Link Interface
40. Which one of the following options is required for a client workstation to connect to a network resource?
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
A striped set array with parity
Client - protocol - and adapter
41. IPX/SPX means...
Service Set Identifier
In the LAN (Local Area Network)
Asynchronous Transfer Mode
Internetwork Packet Exchange/Sequenced Packet Exchange
42. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
Manages network applications
23
MAC (Media Access Control) address
Plain Old Telephone Service
43. When one connection to a host fails in a full mesh network - it means...
100 Mbps (Megabits per second)
All hosts can communicate.
Wireless Protected Access
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
44. What is EAP? What is it used for?
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Check the connection from the WAP (Wireless Access Point) to the network
Periodically (randomly) blinking
45. Workstations
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. A network administrator is troubleshooting connectivity from a client machine. An error message that reads 'Page Cannot be Displayed' is shown in the browser whenever a FQDN (Fully Qualified Domain Name) is typed in the address bar. However - if the
Global System for Mobile Communications
53
2.4 GHz (Gigahertz).
110
47. A user connects to the companys intranet server via a VPN (Virtual Private Network) connection from a SOHO (Small Office / Home Office) using the broadband service. One day - the user cannot successfully connect to the VPN (Virtual Private Network) a
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Direct Current
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Transmission Control Protocol/Internet Protocol
48. What is Unicast?
NetBios
Stores and dispenses files
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Port 20 must also be unblocked.
49. NAC means...
Alternating Current
1
Extranet
Network Access Control
50. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
Application
Trivial File Transfer Protocol
MultiProtocol Label Switching
Primary Rate Interface