SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. List the benefits of a bus topology
Easy to install - Inexpensive - Less actual cable required
Internetwork packet exchange
An eight-position connector which uses UTP (Unshielded Twisted Pair).
PPP (Point-to-Point Protocol)
2. NAC means...
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Network Access Control
Hypertext transfer protocol over secure sockets layer.
CSU / DSU (Channel Service Unit / Data Service Unit)
3. PPTP Means...
Point-to-Point Tunneling Protocol
Service Set Identifier
Basic Input/Output System
Disk Operating System or Denial of Service
4. What is on Port 8080?
80
L2TP (Layer 2 Tunneling Protocol)
Proxy Server
Internet Control Message Protocol
5. NFS Means...
File Transfer Protocol
802.1x
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Network File System
6. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
Simple Network Management Protocol
VPN (Virtual Private Network)
Stores and dispenses files
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
7. TCP means...
SQL Server
cold site.
25
Transmission Control Protocol
8. What is L2TP? What is significant about this protocol?
802.11b
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Open Source Path First - this is a routing protocol
20 & 21
9. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
Transmission Control Protocol/Internet Protocol
100 Mbps (Megabits per second)
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Internet Protocol
10. A firewall can be used to prevent which of the following?
Packets from entering and leaving a network
The device ID (Identification)
Handles e-mail functions
Post Office Protocol 3
11. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Intern
PPP (Point-to-Point Protocol)
The users will not be affected by the change.
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
192.168.96.254
12. Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology. Workstation 1 fails. How can the network administrator remove Workstation 1 for service without moving the other workstations?
They are connected to a switch when trying to capture packets.
Connect Workstation 6 and Workstation 2 using a barrel connector
Proxy
Telnet
13. FTP Means
As a way to share resources and information
File Transfer Protocol
Client - protocol - and adapter
Check the connection from the WAP (Wireless Access Point) to the network
14. A new intranet web server has been installed for a company. The clients access the intranet server by its DNS (Domain Name Service) name. To automatically change the clients to connect to the new server - an administrator modifies the DNS (Domain Nam
128 bit addresses
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Point to Point Protocol
15. What is EAP? What is it used for?
Verification
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Secure Shell
bytes 1-3
16. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
3.1
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Multiple Link Interface
17. A network administrator adds a router to create a new subnet. Which of the following network services requires configuration to accommodate NetBIOS (Network Basic Input / Output System) on the new network?
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
WINS (Windows Internet Name Service)
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
All workstations except Workstation 3 can communicate to each other.
18. ACL means...
Wireless Protected Access
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
SSH
Access Control List
19. 802.11 security is defined in...
802.11i
Integrated Services digital Network
23
172.192.4.256
20. What is on Port 143?
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
Public Switched Telephone Network
IMAP (Mail Client)
Routing Information Protocol
21. A computer that is working on a network is unplugged and then plugged into another switch with a new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not come on. All of the following could be the source of the prob
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
New Technology File System
The file has been opened by another user and is open for read only.
the NIC (Network Interface Card) is bad.
22. PRI Means...
Any device on the network that can ask for access to resources
Hybrid hub
Primary Rate Interface
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
23. What is PAT?
Port Address Translator
Internet Control Message Protocol
They are connected to a switch when trying to capture packets.
encapsulating the data payload.
24. NIC means...
Network Interface Card
netstat
Internet Protocol
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
25. What is NAT?
Network Address Translator
1000BASE-CX
The analyzer is functioning properly.
ifconfig
26. NetBEUI Means...
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Networked Basic Input/Output System Extended User Interface
110
27. Which of the following is used to translate NetBIOS (Network Basic Input / Output System) names
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
SMB (Server Message Block)
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
WINS (Windows Internet Name Service)
28. On what Port is SUN RPC?
Application
Proxy Server
Network File System
111
29. File Server
Stores and dispenses files
Port 20 must also be unblocked.
Handles e-mail functions
Port 161 is SNMP and Port 162 is the SNMP Manager
30. In which OSI (Open Systems Interconnect) layer does a bridge operate?
Data Link
Exterior Gateway Protocol
Switches - bridges - and NICs (Network Interface Card)
Put a router between the two network segments
31. An employee needs to access the internal secure company web site from a hotel. The employee will need which of the following connections?
User Datagram Protocol
Internet connection
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
802.2
32. On what Port is RDP?
10 GBASE-LR
3389
ping
netstat and ping
33. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
ping
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Internet Protocol Security. This is the defacto standard for VPN security.
34. WEP Means...
Handles tasks in the place of other machines on the network
Connect Workstation 6 and Workstation 2 using a barrel connector
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Wired Equivalent Privacy
35. GSM means...
DNS
Global System for Mobile Communications
Internetwork packet exchange
nslookup
36. Host
Any network device with an IP address
Internet mail access protocol
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
L2TP (Layer 2 Tunneling Protocol)
37. A user connects to the companys intranet server via a VPN (Virtual Private Network) connection from a SOHO (Small Office / Home Office) using the broadband service. One day - the user cannot successfully connect to the VPN (Virtual Private Network) a
Service Set Identifier
MAC (Media Access Control) address
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Media Access Unit - Media attachment Unit
38. The Spanning-Tree Protocol allows for redundancy of what networking device?
Digital Subscriber Line
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
111
Bridge
39. TCP/IP Means;
Reverse Address Resolution Protocol.
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Transmission Control Protocol/Internet Protocol
Global System for Mobile Communications
40. CPU means...
Central Processing unit
Router
Networked Basic Input/Output System Extended User Interface
53
41. What is DHCP? What is its key attribute?
All hosts can communicate.
Manages printers on the network
Hypertext transfer protocol
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
42. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
192.168.96.254
Proxy Server
Extranet
Electromagnetic Interference
43. Which one of the following communication protocols does a UNIX system primarily rely on?
53
TCP / IP (Transmission Control Protocol / Internet Protocol)
Service Set Identifier
550 meters (1 -804.46 feet)
44. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
72.16.16.1
TFTP (Trivial File Transfer Protocol)
The device ID (Identification)
45. What is CHAP?
NFS (Network File System)
Challenge Handshake Authentication Protocol
6
ping
46. Company A has two networks - one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to all
Put a router between the two network segments
Hybrid hub
Network Time Protocol
SUN RPC
47. A facility designed to receive computer equipment during a disaster recovery is known as a...
cold site.
All workstations except Workstation 3 can communicate to each other.
SMB (Server Message Block)
Public Switched Telephone Network
48. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?
rlogin
Network Address Translator
Metropolitan Area Network
cold site.
49. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
RDP/ Terminal Services
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
53
Point-to-Point Protocol
50. What is Multicast Transmission?
Media Access Unit - Media attachment Unit
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
PPP (Point-to-Point Protocol)
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests