SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. List the benefits of a bus topology
nslookup
larger subnet masks.
Easy to install - Inexpensive - Less actual cable required
69
2. List the drawbacks of a ring topology
Any device on the network that can ask for access to resources
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Basic Input/Output System
Client - protocol - and adapter
3. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
514
Application
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
4. NFS Means...
New Technology File System
Authentication
Network File System
802.11b
5. Ten workstations numbered 1 through 10 are installed sequentially on a physical star network. The network uses a logical bus topology and is cabled using Category 3 UTP (Unshielded Twisted Pair). The cable to Workstation 3 has been severed. Which of
All workstations except Workstation 3 can communicate to each other.
In a locked room in an offsite location
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
22
6. What is on Port 53?
To decrease network congestion Answer: D
Peer-To-Peer and Client-Server
DNS
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
7. What enables a UNIX computer to access exported file systems from other UNIX computers?
NFS (Network File System)
Lightweight Directory Access Protocol
All hosts can communicate.
This IP (Internet Protocol) address cannot be pinged remotely.
8. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
802.11i
CSU / DSU (Channel Service Unit / Data Service Unit)
Extranet
Hypertext transfer protocol
9. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT...
443
Local Area Network
Port Address Translator
larger subnet masks.
10. The 802.11 frequency band is...
Transport
Multiple Link Interface
2.4 GHz (Gigahertz).
HTTP
11. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
Verification
PPP (Point-to-Point Protocol)
10 GBASE-LR
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
12. ISO Means...
Global System for Mobile Communications
Industry Standards Organization
SQL Server
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
13. In a fully Meshed network - every node has a connection to every other node - 7+6+5+4+3+2+1=28 Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
Password Authentication Protocol
172.192.4.256
CSU / DSU (Channel Service Unit / Data Service Unit)
128 bit addresses
14. A firewall can be used to prevent which of the following?
Network File System
Hypertext transfer protocol
Simple Network Management Protocol
Packets from entering and leaving a network
15. Which one of the following security protocols creates a secure connection over the Internet?
PDC (Primary Domain Controller)
L2TP (Layer 2 Tunneling Protocol)
rlogin
Port 161 is SNMP and Port 162 is the SNMP Manager
16. Which command generated the following output? Active Connections Proto Local Address Foreign Address State TCP CompA:3006 192.168.0.2:Microsoft Established TCP CompA:3021 192.168.0.246:HTTP Established
There will be no Internet access.
netstat
25
An exact duplicate of the infrastructure is mirrored offsite.
17. What is TCP?
Dynamic Host Configuration Protocol
Point-to-Point Tunneling Protocol
Metropolitan Area Network
Transmission Control Protocol
18. NetBIOS Means...
Networked Basic Input/Output System
BootP (Boot Protocol)
MultiProtocol Label Switching
Internet Protocol
19. Why did we develop networking?
Fully Qualified Domain Name
BootP (Boot Protocol)
As a way to share resources and information
Internet Protocol
20. AC means...
Quality of Service
Intrusion Detection System
Alternating Current
Local Area Network
21. CPU means...
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Internet Control Message Protocol
Central Processing unit
Media Access Unit - Media attachment Unit
22. Which one of the following devices connects a network segment to a public telephone network?
Primary Rate Interface
CSU / DSU (Channel Service Unit / Data Service Unit)
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Firewall
23. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?
Light Emitting Diode
bytes 1-3
A long length of antenna extension cable
Simple Network Management Protocol
24. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
10 GBASE-LR
TCP / IP (Transmission Control Protocol / Internet Protocol)
Transmission Control Protocol/Internet Protocol
Put a router between the two network segments
25. What is on Port 443?
Network File System
SMB (Server Message Block)
Data Link
HTTPS/ SSL
26. What is L2TP? What is significant about this protocol?
Domain Name Service OR Domain Name Server
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
POP3
27. GSM means...
Network Address Translation
Proxy Server
A long length of antenna extension cable
Global System for Mobile Communications
28. A user complains that they can no longer access resources on the network. The user is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What is the problem?
In a locked room in an offsite location
Wireless Access Point
Dynamic Host Configuration Protocol
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
29. On what Port is the SMTP Server?
TCP / IP (Transmission Control Protocol / Internet Protocol)
Proxy Server
25
Extranet
30. The Spanning-Tree Protocol allows for redundancy of what networking device?
Manages printers on the network
Integrated Services digital Network
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Bridge
31. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
Internetwork Packet Exchange/Sequenced Packet Exchange
Port 20 must also be unblocked.
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Multipurpose Internet Mail Extension
32. Which protocol does a diskless workstation use to obtain a network address?
Routing Internet Protocol
As a way to share resources and information
BootP (Boot Protocol)
Network Address Translation
33. Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology. Workstation 1 fails. How can the network administrator remove Workstation 1 for service without moving the other workstations?
100 Mbps (Megabits per second)
Connect Workstation 6 and Workstation 2 using a barrel connector
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
gateway.
34. A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)?
Bayonet-Neill-Concelman or British Naval Connector
Router
Network Address Translation
Port 20 must also be unblocked.
35. On what Port is HTTPS/ SSL?
Transmission Control Protocol
443
Integrated Services digital Network
Hypertext transfer protocol
36. IEEE means...
Institute of Electrical and Electronics Engineers
3.1
Reverse Address Resolution Protocol.
Hypertext transfer protocol
37. Which protocol could be used by a VPN (Virtual Private Network)?
Media Access Control
Firewall
Open Source Path First - this is a routing protocol
PPTP (Point-to-Point Tunneling Protocol)
38. Which one of the following options is a security standard for 802.11?
Direct Current
Multiple Link Interface
Password Authentication Protocol
WEP (Wired Equivalent Privacy)
39. IIS Means...
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Internet Information Services
They are connected to a switch when trying to capture packets.
40. SSL Means...
Port Address Translator
53
Secure Shell
Secure Sockets Layer
41. TCP means...
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Access Control List
Gateway
Transmission Control Protocol
42. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
ping
Multiple Link Interface
Networked Basic Input/Output System Extended User Interface
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
43. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by...
Network File System
TFTP (Trivial File Transfer Protocol)
passing a username and password in plaintext.
Internetwork Packet Exchange/Sequenced Packet Exchange
44. A company wants to have an intranet. Where would the intranet web server be located in the network?
WEP (Wired Equivalent Privacy)
Peer-To-Peer and Client-Server
raphical User Interface
In the LAN (Local Area Network)
45. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. What is DHCP? What is its key attribute?
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
The users will not be affected by the change.
1000BASE-CX
Direct Current
47. What is RARP?
Reverse Address Resolution Protocol.
Lightweight Directory Access Protocol
Post Office Protocol
As a way to share resources and information
48. What is on Port 80?
Internet Control Message Protocol
HTTP
Network Address Translation
Intrusion Detection System
49. NIC means...
larger subnet masks.
Network Interface Card
111
Fully Qualified Domain Name
50. A computer that is working on a network is unplugged and then plugged into another switch with a new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not come on. All of the following could be the source of the prob
Proxy Server
Proxy
netstat
the NIC (Network Interface Card) is bad.