SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. Which UNIX service provides interoperability with Windows file and print sharing?
Post Office Protocol 3
SMB (Server Message Block)
25
Stores and dispenses files
3. A network administrator is troubleshooting connectivity from a client machine. An error message that reads 'Page Cannot be Displayed' is shown in the browser whenever a FQDN (Fully Qualified Domain Name) is typed in the address bar. However - if the
Peer-To-Peer and Client-Server
User Datagram Protocol. This protocol is connectionless and routable.
Point to Point Tunneling Protocol
53
4. SSID Means...
Service Set Identifier
the NIC (Network Interface Card) is bad.
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Multipurpose Internet Mail Extension
5. A facility designed to receive computer equipment during a disaster recovery is known as a...
There will be no Internet access.
6
larger subnet masks.
cold site.
6. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
Secure Shell
Port 20 must also be unblocked.
Manages printers on the network
Media Access Unit - Media attachment Unit
7. Which one of the following choices is the MOST secure place to store tape backups?
larger subnet masks.
514
In a locked room in an offsite location
Select the most probable cause
8. What are the two main network types?
Internetwork Packet Exchange/Sequenced Packet Exchange
2
Peer-To-Peer and Client-Server
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
9. UDP Means...
They are connected to a switch when trying to capture packets.
Verification
User Datagram Protocol
Reverse Address Resolution Protocol.
10. Which one of the following options is a security standard for 802.11?
Challenge Handshake Authentication Protocol
WEP (Wired Equivalent Privacy)
raphical User Interface
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
11. What is on Port 23?
Presentation
Transport
Telnet
WEP (Wired Equivalent Privacy)
12. WPA Means...
Wireless Protected Access
WINS (Windows Internet Name Service)
ifconfig
VPN (Virtual Private Network)
13. A technician is troubleshooting a problem on a network using a utility to capture the packets. When the technician reviews the captured data they have only captured broadcast packets and packets from their own computer. What is the reason for this?
MT-RJ (Mechanical Transfer-Registered Jack)
They are connected to a switch when trying to capture packets.
Transmission Control Protocol
514
14. What is on Port 22?
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
SSH
22
Sys Log (Unix) or Event Manager (Windows)
15. What is on Port 514?
Primary Rate Interface
1000BASE-CX
Proxy Server
Sys Log (Unix) or Event Manager (Windows)
16. POTS means...
Plain Old Telephone Service
Wired Equivalent Privacy
TCP / IP (Transmission Control Protocol / Internet Protocol)
40 bit - 128 bit - 64 bit
17. Telephony Server
WEP (Wired Equivalent Privacy)
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
passing a username and password in plaintext.
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
18. File Server
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Stores and dispenses files
Check the connection from the WAP (Wireless Access Point) to the network
Institute of Electrical and Electronics Engineers
19. IP means...
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Internet Protocol
As a way to share resources and information
Router
20. ICMP means...
Internet Control Message Protocol
Media Access Control
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
L2TP (Layer 2 Tunneling Protocol)
21. WEP Means...
3389
20 & 21
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Wired Equivalent Privacy
22. What is NAT?
Network Address Translator
Global System for Mobile Communications
Port 161 is SNMP and Port 162 is the SNMP Manager
Global Positioning System
23. Which command will produce the following output? ethoLink encap : Ethernet HWaddr: 00:80:C8:D6:74:43 inet adder : 4.150.6.3 Bcast : 4.255.255.255 Mask: 255.0.0.0
CSU / DSU (Channel Service Unit / Data Service Unit)
ifconfig
The Internet router is blocking port 25.
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
24. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
Application
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
CSU / DSU (Channel Service Unit / Data Service Unit)
25. Web Server
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
SMB (Server Message Block)
Periodically (randomly) blinking
53
26. Wi-Fi Means...
ICMP (Internet Control Message Protocol)
Wireless Fidelity
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Address Resolution Protocol. Has no error control.
27. MPLS
1000BASE-CX
25
MultiProtocol Label Switching
RDP/ Terminal Services
28. NNTP Means...
WINS (Windows Internet Name Service)
Remote Desktop Protocol
Network News Transfer Protocol
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
29. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
30. What is on Port 443?
HTTPS/ SSL
Reverse Address Resolution Protocol.
TFTP (Trivial File Transfer Protocol)
To decrease network congestion Answer: D
31. Application Server
A long length of antenna extension cable
Manages network applications
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Time domain reflectometer
32. POP3 Means...
Disk Operating System or Denial of Service
Multipurpose Internet Mail Extension
69
Post Office Protocol 3
33. On what Port is RDP?
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
3389
An old microwave oven is being used in the break room which causes interference with the access point.
SUN RPC
34. The Spanning-Tree Protocol allows for redundancy of what networking device?
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
Application
Bridge
Packets from entering and leaving a network
35. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a...
Password Authentication Protocol
gateway.
Internet Control Message Protocol
Proxy Server
36. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
ICMP (Internet Control Message Protocol)
Sys Log (Unix) or Event Manager (Windows)
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
CSU / DSU (Channel Service Unit / Data Service Unit)
37. What is on Port 69?
Media Access Control
2
TFTP (Trivial File Transfer Protocol)
A long length of antenna extension cable
38. On what Port is NetBios?
TFTP (Trivial File Transfer Protocol)
Point to Point Tunneling Protocol
Internetwork packet exchange
135-139
39. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
It is an address assigned to a NIC (Network Interface Card).
Proxy server
1000BASE-LX and10 GBASE-LR
rlogin
40. List the drawbacks of a star topology
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Transmission Control Protocol
Network Interface Card
Industry Standards Organization
41. Which one of the following servers provides web caching services?
Peer-To-Peer and Client-Server
Proxy
Network and Transport
SSH
42. A computer that is working on a network is unplugged and then plugged into another switch with a new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not come on. All of the following could be the source of the prob
TFTP (Trivial File Transfer Protocol)
the NIC (Network Interface Card) is bad.
encapsulating the data payload.
Client - protocol - and adapter
43. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model?
BootP (Boot Protocol)
D. Switch and bridge
Extranet
Put a router between the two network segments
44. In a fully Meshed network - every node has a connection to every other node - 7+6+5+4+3+2+1=28 Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
Lightweight Directory Access Protocol
These are the FTP ports. Port 20 handles data and Port 21 provides control.
CSU / DSU (Channel Service Unit / Data Service Unit)
1000BASE-CX
45. In which OSI (Open Systems Interconnect) layer does a bridge operate?
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Data Link
2
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
46. DHCP means...
In the LAN (Local Area Network)
389
All workstations except Workstation 3 can communicate to each other.
Dynamic Host Configuration Protocol
47. What is a MAC (Media Access Control) address?
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Two or more connected computers that can share resources
It is an address assigned to a NIC (Network Interface Card).
Dynamic Host Configuration Protocol
48. What is on Port 80?
HTTP
802.11a.
PPTP (Point-to-Point Tunneling Protocol)
1
49. PRI Means...
They are connected to a switch when trying to capture packets.
Networked Basic Input/Output System Extended User Interface
The users will not be affected by the change.
Primary Rate Interface
50. CPU means...
Central Processing unit
Wired Equivalent Privacy
DNS
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers