SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
Network Address Translation
1000BASE-CX
Routing Internet Protocol
Authentication
2. Which one of the following options is a security standard for 802.11?
User Datagram Protocol
WEP (Wired Equivalent Privacy)
10
Basic Input/Output System
3. Which of the following options allows for secure communication over the Internet?
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Stores and dispenses files
Physical
VPN (Virtual Private Network)
4. DHCP means...
Dynamic Host Configuration Protocol
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
25
An exact duplicate of the infrastructure is mirrored offsite.
5. Describe a bus topology
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
cold site.
802.2
6. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
25
NFS (Network File System)
Select the most probable cause
7. NFS Means...
Select the most probable cause
Proxy
Network File System
143
8. SSH Means...
Secure Shell
RDP/ Terminal Services
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Central Processing unit
9. On what Port is DNS?
53
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
User Datagram Protocol. This protocol is connectionless and routable.
Connect Workstation 6 and Workstation 2 using a barrel connector
10. Which one of the following options is required for a client workstation to connect to a network resource?
Client - protocol - and adapter
Internetwork Packet Exchange/Sequenced Packet Exchange
Hypertext transfer protocol over secure sockets layer.
550 meters (1 -804.46 feet)
11. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
802.11
CSU / DSU (Channel Service Unit / Data Service Unit)
ICMP (Internet Control Message Protocol)
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
12. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)?
100BASE-FX Answer: D
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
25
Any network device with an IP address
13. What is a MAC (Media Access Control) address?
ICMP (Internet Control Message Protocol)
RJ-11 (Registered Jack)
It is an address assigned to a NIC (Network Interface Card).
Point to Point Tunneling Protocol
14. Which one of the following choices is the MOST secure place to store tape backups?
WINS (Windows Internet Name Service)
Transmission Control Protocol
In a locked room in an offsite location
Select the most probable cause
15. Which protocol does a diskless workstation use to obtain a network address?
BootP (Boot Protocol)
Bus
T1 (T-Carrier Level 1).
RJ-11 (Registered Jack)
16. EMI means...
100 Mbps (Megabits per second)
Electromagnetic Interference
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
SMB (Server Message Block)
17. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
53
128 bit addresses
100BASE-FX Answer: D
The file has been opened by another user and is open for read only.
18. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. Workstations
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. SSID Means...
Internet mail access protocol
Service Set Identifier
Server Message Block OR Small-to-Midsize Business
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
21. A new intranet web server has been installed for a company. The clients access the intranet server by its DNS (Domain Name Service) name. To automatically change the clients to connect to the new server - an administrator modifies the DNS (Domain Nam
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Server Message Block OR Small-to-Midsize Business
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
22. A network administrator implements four VLANs (Virtual Local Area Network) on a switch. Which device will be required to pass traffic among the VLANs (Virtual Local Area Network)?
48 bits.
Router
NetBios
53
23. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
Hypertext transfer protocol over secure sockets layer.
Put a router between the two network segments
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
10 GBASE-LR
24. Which protocol is used for error reporting in concert with the IP protocol?
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
ICMP (Internet Control Message Protocol)
169.254.1.1
1000BASE-CX
25. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
389
There will be no Internet access.
Uniform Resource Locator
26. Which of the following choices describes an RJ-45 (Registered Jack) connector?
An eight-position connector which uses UTP (Unshielded Twisted Pair).
POP3
netstat
In the LAN (Local Area Network)
27. Describe a ring topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
28. NTP means...
Network Time Protocol
encapsulating the data payload.
Time domain reflectometer
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
29. To increase the number of available IP (Internet Protocol) addresses - IPv6 (Internet Protocol version 6) uses which one of the following options?
Two or more connected computers that can share resources
Fully Qualified Domain Name
Bayonet-Neill-Concelman or British Naval Connector
128 bit addresses
30. On a switched Ethernet network that is operating perfectly - what is the state in which a user will find the activity LED (Light Emitting Diode)?
Transmission Control Protocol
netstat
Periodically (randomly) blinking
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
31. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by...
passing a username and password in plaintext.
CSU / DSU (Channel Service Unit / Data Service Unit)
802.2
10 GBASE-LR
32. DC means...
Light Emitting Diode
Direct Current
Industry Standards Organization
Server Message Block OR Small-to-Midsize Business
33. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Intern
802.11
192.168.96.254
802.11i
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
34. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Extranet
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Alternating Current
35. Fault Tolerance
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Institute of Electrical and Electronics Engineers
This IP (Internet Protocol) address cannot be pinged remotely.
Network News Transfer Protocol
36. All of the following options transmit data over a modem EXCEPT...
Hypertext transfer protocol
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Internet Service Provider
T1 (T-Carrier Level 1).
37. Given the following output - which utility was used? Default Server: bigserver.datacenter.com Address: 4.12.18.1
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
traceroute
802.11b
nslookup
38. ISP Means...
Internet Service Provider
CSU / DSU (Channel Service Unit / Data Service Unit)
389
Secure Sockets Layer
39. A facility designed to receive computer equipment during a disaster recovery is known as a...
Handles e-mail functions
cold site.
69
NetBios
40. NNTP Means...
PPP (Point-to-Point Protocol)
the NIC (Network Interface Card) is bad.
D. Switch and bridge
Network News Transfer Protocol
41. What is IPSEC? Why is it significant?
1000BASE-CX
Internet Protocol Security. This is the defacto standard for VPN security.
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Point-to-Point Protocol
42. A network administrator is troubleshooting a wireless LAN (Local Area Network) that is experiencing trouble with interference. A scan of the wireless network reports that there are two WAPs (Wireless Access Point) from different companies within rang
Point-to-Point Tunneling Protocol
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
CSU / DSU (Channel Service Unit / Data Service Unit)
Public Key Infrastructure
43. A valid MAC (Media Access Control) address is how many bytes long?
6
Address Resolution Protocol. Has no error control.
Internet Control Message Protocol
Plain Old Telephone Service
44. Which one of the following devices connects a network segment to a public telephone network?
Bayonet-Neill-Concelman or British Naval Connector
8080
CSU / DSU (Channel Service Unit / Data Service Unit)
Trivial File Transfer Protocol
45. TFTP Means...
MT-RJ (Mechanical Transfer-Registered Jack)
53
Trivial File Transfer Protocol
netstat and ping
46. SMB Means...
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Integrated Services digital Network
nslookup
Server Message Block OR Small-to-Midsize Business
47. The 802.11 frequency band is...
172.192.4.256
PDC (Primary Domain Controller)
L2TP (Layer 2 Tunneling Protocol)
2.4 GHz (Gigahertz).
48. WINS Means...
DNS (Domain Name Service) server settings
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Windows Internet Name Service
Public Key Infrastructure
49. MAC Means...
passing a username and password in plaintext.
Dynamic Host Configuration Protocol
Internet Protocol
Media Access Control
50. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Presentation
Network Address Translator
ICMP (Internet Control Message Protocol)
There will be no Internet access.