SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. If a destination address is not in a bridges forwarding table - what will the bridge do?
Bridge
Internetwork packet exchange
Forward the packets to all ports except the one that originated the request
IMAP (Mail Client)
2. RIP Means...
Forward the packets to all ports except the one that originated the request
Lightweight Directory Access Protocol
Routing Information Protocol
1433
3. A user complains that they can no longer access resources on the network. The user is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What is the problem?
An old microwave oven is being used in the break room which causes interference with the access point.
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
rlogin
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
4. Which of the following options allows for secure communication over the Internet?
Physical
VPN (Virtual Private Network)
As a way to share resources and information
Data Link
5. What is on Port 110?
ifconfig
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
POP3
Disk Operating System or Denial of Service
6. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
netstat and ping
Forward the packets to all ports except the one that originated the request
128 bit addresses
Handles e-mail functions
7. List the benefits of a bus topology
Manages printers on the network
Physical
Easy to install - Inexpensive - Less actual cable required
172.192.4.256
8. Which one of the following is true concerning bridges and their forwarding decisions?
Network Access Control
encapsulating the data payload.
Internet Control Message Protocol
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
9. What is CHAP?
netstat and ping
The analyzer is functioning properly.
Challenge Handshake Authentication Protocol
Institute of Electrical and Electronics Engineers
10. NAT Means...
Asynchronous Transfer Mode
HTTP
389
Network Address Translation
11. IDS means...
Intrusion Detection System
SQL Server
VPN (Virtual Private Network)
Data Link
12. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a...
Primary Rate Interface
Verification
gateway.
802.11
13. ACL means...
Access Control List
25
They are connected to a switch when trying to capture packets.
Network News Transfer Protocol
14. Which one of the following security protocols creates a secure connection over the Internet?
Forward the packets to all ports except the one that originated the request
Domain Name Service OR Domain Name Server
larger subnet masks.
L2TP (Layer 2 Tunneling Protocol)
15. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. On what Port is HTTPS/ SSL?
In a locked room in an offsite location
Connect Workstation 6 and Workstation 2 using a barrel connector
POP3
443
17. On what Port is Sys Log/ Event Manager?
Two or more connected computers that can share resources
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
514
This IP (Internet Protocol) address cannot be pinged remotely.
18. File Server
Internetwork Packet Exchange/Sequenced Packet Exchange
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
L2TP (Layer 2 Tunneling Protocol)
Stores and dispenses files
19. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)?
100BASE-FX Answer: D
rlogin
Internet Protocol
Port 161 is SNMP and Port 162 is the SNMP Manager
20. TFTP Means...
Gateway
802.11i
Trivial File Transfer Protocol
Internet Protocol
21. Which one of the following communication protocols does a UNIX system primarily rely on?
Any device on the network that can ask for access to resources
Global System for Mobile Communications
TCP / IP (Transmission Control Protocol / Internet Protocol)
rlogin
22. TDR means...
Time domain reflectometer
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Internet Protocol
169.254.1.1
23. ISDN means...
D. Switch and bridge
Bayonet-Neill-Concelman or British Naval Connector
Integrated Services digital Network
100BASE-FX Answer: D
24. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
New Technology File System
169.254.1.1
Trivial File Transfer Protocol
A. 18 -000 feet (5 -486.4 meters)
25. Describe a bus topology
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
the NIC (Network Interface Card) is bad.
Verification
26. A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)?
Network Time Protocol
1000BASE-CX
Domain Name Service OR Domain Name Server
Router
27. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
Service Set Identifier
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
A striped set array with parity
28. What is on Port 111?
Port Address Translator
HTTPS/ SSL
These are the FTP ports. Port 20 handles data and Port 21 provides control.
SUN RPC
29. Which protocol could be used by a VPN (Virtual Private Network)?
23
PPTP (Point-to-Point Tunneling Protocol)
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Electromagnetic Interference
30. HTTPS means...
SQL Server
Hypertext transfer protocol over secure sockets layer.
RDP/ Terminal Services
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
31. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
Network and Transport
80
1000BASE-LX and10 GBASE-LR
Institute of Electrical and Electronics Engineers
32. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model?
Disk Operating System or Denial of Service
ifconfig
Point to Point Tunneling Protocol
D. Switch and bridge
33. LAN Means...
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Network Time Protocol
Local Area Network
The analyzer is functioning properly.
34. This is not an IP (Internet Protocol) addresses.
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
cold site.
72.16.16.1
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
35. What is on Port 53?
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
172.192.4.256
Domain Name Service OR Domain Name Server
DNS
36. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Direct Current
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
The device ID (Identification)
37. Which OSI (Open Systems Interconnect) layer converts digital data into electronic signals to beput on a wire?
Basic Input/Output System
Physical
100BASE-FX Answer: D
Point-to-Point Protocol
38. What is on Port 3389?
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
10 GBASE-LR
Exterior Gateway Protocol
RDP/ Terminal Services
39. MAC Means...
53
Media Access Control
The 'memo maker' that sends and receives paperless faxes over the network
NetBios
40. WINS Means...
An exact duplicate of the infrastructure is mirrored offsite.
Domain Name Service OR Domain Name Server
Windows Internet Name Service
passing a username and password in plaintext.
41. Which one of the following options is required for a client workstation to connect to a network resource?
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Client - protocol - and adapter
42. Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology. Workstation 1 fails. How can the network administrator remove Workstation 1 for service without moving the other workstations?
Connect Workstation 6 and Workstation 2 using a barrel connector
SSL (Secure Sockets Layer)
The device ID (Identification)
143
43. What is Broadcast Transmission?
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Industry Standards Organization
Transmission Control Protocol
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
44. On what Port is TFTP?
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
69
The device ID (Identification)
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
45. A network technician is troubleshooting a remote home users computer that is behind a SOHO (Small Office / Home Office) router running NAT (Network Address Translation). The technician wants to ping the IP (Internet Protocol) address of the remote us
110
This IP (Internet Protocol) address cannot be pinged remotely.
Intrusion Detection System
22
46. What is PAT?
Port Address Translator
nslookup
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
1000BASE-LX and10 GBASE-LR
47. Examples of valid WEP (Wired Equivalent Privacy) key lengths
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
802.11i
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
40 bit - 128 bit - 64 bit
48. On what Port is the Proxy Server?
Routing Information Protocol
NetBios
8080
Windows Internet Name Service
49. Proxy Server
Bayonet-Neill-Concelman or British Naval Connector
In a locked room in an offsite location
Extranet
Handles tasks in the place of other machines on the network
50. EMI means...
Integrated Services digital Network
Routing Internet Protocol
Electromagnetic Interference
encapsulating the data payload.