SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
Application
cold site.
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
2. Logical Topology
In the LAN (Local Area Network)
The 'memo maker' that sends and receives paperless faxes over the network
A network map showing exactly how data moves through the network.
Periodically (randomly) blinking
3. LAN Means...
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
25
SMB (Server Message Block)
Local Area Network
4. On what Port is POP3?
3.1
110
rlogin
Network News Transfer Protocol
5. A user complains that they can no longer access resources on the network. The user is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What is the problem?
CSU / DSU (Channel Service Unit / Data Service Unit)
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
CSU / DSU (Channel Service Unit / Data Service Unit)
Proxy server
6. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Proxy
1000BASE-CX
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
7. Given the output: 1.pgw (129.6.80.254) * 4ms 3ms 2.129.6.1.245 (129.6.1.245) 4ms 3ms * 3.129.6.2.252 (129.6.2.252) 5ms 5ms 4ms Which of the following commands causes the results above?
Router
traceroute
raphical User Interface
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
8. On what Port is SSH?
22
Put a router between the two network segments
6
Check the connection from the WAP (Wireless Access Point) to the network
9. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
10
Network and Transport
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
389
10. PPTP Means...
Point-to-Point Tunneling Protocol
WEP (Wired Equivalent Privacy)
1000BASE-CX
Proxy Server
11. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) copper cable standard?
Central Processing unit
143
1000BASE-CX
Internet connection
12. Why did we develop networking?
Extranet
As a way to share resources and information
Network Address Translator
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
13. What is UDP? What are some of its attributes?
HTTPS/ SSL
User Datagram Protocol. This protocol is connectionless and routable.
Bluetooth enabled cell phones
69
14. PRI Means...
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
HTTPS/ SSL
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Primary Rate Interface
15. A network administrator is troubleshooting connectivity from a client machine. An error message that reads 'Page Cannot be Displayed' is shown in the browser whenever a FQDN (Fully Qualified Domain Name) is typed in the address bar. However - if the
53
Multipurpose Internet Mail Extension
1433
Switches - bridges - and NICs (Network Interface Card)
16. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
Multipurpose Internet Mail Extension
The file has been opened by another user and is open for read only.
Quality of Service
A 2.4 GHz (Gigahertz) cordless telephone is in use.
17. What is Multicast Transmission?
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Network and Transport
18. What is the minimum number of hard drives required to implement RAID 0 (Redundant Array of Independent Disks)?
Proxy
135-139
2
Internet mail access protocol
19. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
Server Message Block OR Small-to-Midsize Business
20 & 21
Fully Qualified Domain Name
20. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
25
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
100BASE-FX Answer: D
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
21. POTS means...
Plain Old Telephone Service
They are connected to a switch when trying to capture packets.
Port Address Translator
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
22. What is on Port 69?
Service Set Identifier
Media Access Unit - Media attachment Unit
TFTP (Trivial File Transfer Protocol)
172.192.4.256
23. HTTP Means...
Access Control List
Port Address Translator
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Hypertext transfer protocol
24. A Windows 2000 work station has a TCP / IP (Transmission Control Protocol / Internet Protocol) address of 169.254.12.1. Which statement describes the state of the computers TCP / IP (Transmission Control Protocol / Internet Protocol) configuration?
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
TFTP (Trivial File Transfer Protocol)
Hybrid hub
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
25. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
The device ID (Identification)
Network News Transfer Protocol
Manages printers on the network
Authentication
26. Which one of the following security protocols creates a secure connection over the Internet?
L2TP (Layer 2 Tunneling Protocol)
TFTP (Trivial File Transfer Protocol)
TFTP (Trivial File Transfer Protocol)
Secure Shell
27. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
Proxy server
1000BASE-CX
72.16.16.1
Password Authentication Protocol
28. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
Connect Workstation 6 and Workstation 2 using a barrel connector
10 GBASE-LR
53
Port 20 must also be unblocked.
29. What is NAT?
Electromagnetic Interference
HTTPS/ SSL
Point-to-Point Protocol
Network Address Translator
30. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
Simple Network Management Protocol
443
Institute of Electrical and Electronics Engineers
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
31. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
802.1x
An old microwave oven is being used in the break room which causes interference with the access point.
To decrease network congestion Answer: D
TCP / IP (Transmission Control Protocol / Internet Protocol)
32. What functionality does Kerberos provide?
A network map showing exactly how data moves through the network.
Authentication
Verification
Basic Rate Interface
33. What is on Ports 135-139?
Simple Network Management Protocol
Point-to-Point Protocol
389
NetBios
34. List the benefits of a bus topology
53
69
Easy to install - Inexpensive - Less actual cable required
Handles tasks in the place of other machines on the network
35. An employee needs to access the internal secure company web site from a hotel. The employee will need which of the following connections?
encapsulating the data payload.
Internet connection
53
TFTP (Trivial File Transfer Protocol)
36. SNMP Means...
3.1
Connect Workstation 6 and Workstation 2 using a barrel connector
Simple Network Management Protocol
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
37. PSTN Means...
Asynchronous Transfer Mode
bytes 1-3
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Public Switched Telephone Network
38. What is RARP?
All workstations except Workstation 3 can communicate to each other.
Reverse Address Resolution Protocol.
Access Control List
passing a username and password in plaintext.
39. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
Network News Transfer Protocol
100BASE-FX Answer: D
ping
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
40. BIOS Means...
MultiProtocol Label Switching
Basic Input/Output System
TFTP (Trivial File Transfer Protocol)
CSU / DSU (Channel Service Unit / Data Service Unit)
41. On what Port is DNS?
RDP/ Terminal Services
raphical User Interface
Check the connection from the WAP (Wireless Access Point) to the network
53
42. What is PPTP?
NFS (Network File System)
53
Point to Point Tunneling Protocol
WINS (Windows Internet Name Service)
43. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
CSU / DSU (Channel Service Unit / Data Service Unit)
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
netstat
44. IPX Means...
Internet Protocol
As a way to share resources and information
Internetwork packet exchange
Put a router between the two network segments
45. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
SMB (Server Message Block)
An exact duplicate of the infrastructure is mirrored offsite.
The analyzer is functioning properly.
Implement VLANs (Virtual Local Area Network)
46. NAC means...
netstat and ping
Network Access Control
Internet Protocol Security. This is the defacto standard for VPN security.
DNS
47. File Server
Post Office Protocol
1000BASE-LX and10 GBASE-LR
514
Stores and dispenses files
48. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)?
2
NFS (Network File System)
802.11
Remote Desktop Protocol
49. A network administrator is troubleshooting a wireless LAN (Local Area Network) that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs (Wireless Access Point) from different companies within rang
cold site.
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Internet Protocol Security
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
50. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
Verification
53
Transmission Control Protocol
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.