SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. TDR means...
Time domain reflectometer
Application
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
802.11a.
2. What is on Port 143?
netstat
IMAP (Mail Client)
RJ-11 (Registered Jack)
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
3. TFTP Means...
23
10 GBASE-LR
An old microwave oven is being used in the break room which causes interference with the access point.
Trivial File Transfer Protocol
4. IP means...
Internet connection
Internet Protocol
Exterior Gateway Protocol
Network Access Control
5. Which command generated the following output? Active Connections Proto Local Address Foreign Address State TCP CompA:3006 192.168.0.2:Microsoft Established TCP CompA:3021 192.168.0.246:HTTP Established
An old microwave oven is being used in the break room which causes interference with the access point.
Stores and dispenses files
netstat
Transmission Control Protocol
6. RIP Means...
Network Interface Card
Routing Information Protocol
Transmission Control Protocol
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
7. DSL means...
Digital Subscriber Line
Data Link
DNS (Domain Name Service) server settings
WEP (Wired Equivalent Privacy)
8. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
ICMP (Internet Control Message Protocol)
Point to Point Protocol
Multiple Link Interface
An old microwave oven is being used in the break room which causes interference with the access point.
9. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses
Point to Point Tunneling Protocol
48 bits.
Routing Internet Protocol
1000BASE-LX and10 GBASE-LR
10. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
MAC (Media Access Control) address
rp
The 'memo maker' that sends and receives paperless faxes over the network
6
11. On what Port is HTTP?
Port Address Translator
Authentication
80
In the LAN (Local Area Network)
12. ISP Means...
Internet Service Provider
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Open Source Path First - this is a routing protocol
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
13. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. Which fiber connector looks similar to an RJ-45 (Registered Jack) connector and connects two strands of fiber?
110
MT-RJ (Mechanical Transfer-Registered Jack)
Implement VLANs (Virtual Local Area Network)
53
15. What is on Port 69?
TFTP (Trivial File Transfer Protocol)
Proxy
Institute of Electrical and Electronics Engineers
Exterior Gateway Protocol
16. Which protocol is the fastest file transfer protocol?
There will be no Internet access.
Gateway
TFTP (Trivial File Transfer Protocol)
Internet mail access protocol
17. Which one of the following devices connects a network segment to a public telephone network?
PDC (Primary Domain Controller)
Check the connection from the WAP (Wireless Access Point) to the network
CSU / DSU (Channel Service Unit / Data Service Unit)
ICMP (Internet Control Message Protocol)
18. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
3389
HTTPS/ SSL
The file has been opened by another user and is open for read only.
1433
19. Proxy Server
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Handles tasks in the place of other machines on the network
New Technology File System
20. Print Server
MAC (Media Access Control) address
Lightweight Directory Access Protocol
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Manages printers on the network
21. AC means...
T1 (T-Carrier Level 1).
Provides remote users with access to the network through modems and an IP connection
2.4 GHz (Gigahertz).
Alternating Current
22. POP Means...
802.2
It is an address assigned to a NIC (Network Interface Card).
Post Office Protocol
Access Control List
23. What part of an Ethernet MAC (Media Access Control) address designates the manufacturer of the NIC (Network Interface Card)?
389
25
bytes 1-3
Periodically (randomly) blinking
24. All of the following options transmit data over a modem EXCEPT...
This IP (Internet Protocol) address cannot be pinged remotely.
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Internet Protocol Security. This is the defacto standard for VPN security.
T1 (T-Carrier Level 1).
25. A firewall can be used to prevent which of the following?
Quality of Service
135-139
Packets from entering and leaving a network
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
26. Fault Tolerance
1
Handles tasks in the place of other machines on the network
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
3389
27. What is DHCP? What is its key attribute?
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Wireless Protected Access
Peer-To-Peer and Client-Server
28. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
HTTP
Verification
The analyzer is functioning properly.
22
29. What is on Port 22?
The Internet router is blocking port 25.
Point to Point Tunneling Protocol
RDP/ Terminal Services
SSH
30. Company A has two networks - one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to all
Network Interface Card
Put a router between the two network segments
All hosts can communicate.
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
31. Network
Two or more connected computers that can share resources
All hosts can communicate.
In a locked room in an offsite location
Address Resolution Protocol. Has no error control.
32. What is the minimum number of hard drives required to implement RAID 0 (Redundant Array of Independent Disks)?
2
SSL (Secure Sockets Layer)
An exact duplicate of the infrastructure is mirrored offsite.
Wireless Protected Access
33. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this?
Global Positioning System
48 bits.
6
They are connected to a switch when trying to capture packets.
34. IDS means...
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Intrusion Detection System
Metropolitan Area Network
An exact duplicate of the infrastructure is mirrored offsite.
35. What is on Port 3389?
Internet connection
Lightweight Directory Access Protocol
RDP/ Terminal Services
Internet Control Message Protocol
36. What is CHAP?
Address Resolution Protocol. Has no error control.
Router
TCP / IP (Transmission Control Protocol / Internet Protocol)
Challenge Handshake Authentication Protocol
37. MAN Means...
ping
Metropolitan Area Network
802.11a.
Light Emitting Diode
38. What is a MAC (Media Access Control) address?
25
It is an address assigned to a NIC (Network Interface Card).
A long length of antenna extension cable
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
39. MIME means...
53
Multipurpose Internet Mail Extension
SSL (Secure Sockets Layer)
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
40. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
Sys Log (Unix) or Event Manager (Windows)
Hybrid hub
802.1x
NetBios
41. Which one of the following servers provides web caching services?
raphical User Interface
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Token passing
Proxy
42. WEP Means...
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
Media Access Unit - Media attachment Unit
Wired Equivalent Privacy
PPP (Point-to-Point Protocol)
43. Telephony Server
POP3
Asynchronous Transfer Mode
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
44. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolve
RDP/ Terminal Services
Verification
HTTPS/ SSL
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
45. LED Means...
Hybrid hub
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
the NIC (Network Interface Card) is bad.
Light Emitting Diode
46. 802.11 security is defined in...
110
SSH
802.11i
Two or more connected computers that can share resources
47. WAP Means...
In a locked room in an offsite location
Any network device with an IP address
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Wireless Access Point
48. What is on Ports 20 and 21?
40 bit - 128 bit - 64 bit
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Trivial File Transfer Protocol
49. A facility designed to receive computer equipment during a disaster recovery is known as a...
Internet Protocol
cold site.
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
50. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
MultiProtocol Label Switching
10 GBASE-LR
Port Address Translator
Network and Transport