SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolve
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Password Authentication Protocol
In the LAN (Local Area Network)
6
2. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
Application
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Hybrid hub
Client - protocol - and adapter
3. What is Broadcast Transmission?
TCP / IP (Transmission Control Protocol / Internet Protocol)
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Bus
Disk Operating System or Denial of Service
4. Which OSI (Open Systems Interconnect) layer converts digital data into electronic signals to beput on a wire?
SSH
Global Positioning System
20 & 21
Physical
5. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. A user complains that they are unable to connect to a remote server using either FTP (File Transfer Protocol) or Telnet - although the user was able to connect yesterday. Which of the following commands is used to troubleshoot the problem?
nslookup
192.168.96.254
ping
Manages network applications
7. WAP Means...
Wireless Access Point
Primary Rate Interface
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Internet mail access protocol
8. Print Server
Dynamic Host Configuration Protocol
Manages printers on the network
Global Positioning System
110
9. NIC means...
1433
Network Access Control
Network Interface Card
Asynchronous Transfer Mode
10. On a switched Ethernet network that is operating perfectly - what is the state in which a user will find the activity LED (Light Emitting Diode)?
Periodically (randomly) blinking
128 bit addresses
The 'memo maker' that sends and receives paperless faxes over the network
Global System for Mobile Communications
11. What is on Ports 135-139?
All hosts can communicate.
The amber light is flashing occasionally and the green light is lit steadily.
NetBios
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
12. What is a MAC (Media Access Control) address?
Time domain reflectometer
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
It is an address assigned to a NIC (Network Interface Card).
Industry Standards Organization
13. What is CHAP?
Challenge Handshake Authentication Protocol
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
111
Secure Shell
14. A valid MAC (Media Access Control) address is how many bytes long?
traceroute
Basic Input/Output System
6
20 & 21
15. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
Lightweight Directory Access Protocol
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Remote Desktop Protocol
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
16. What is on Port 110?
POP3
Time domain reflectometer
Internetwork Packet Exchange/Sequenced Packet Exchange
Secure Sockets Layer
17. What is on Port 80?
CSU / DSU (Channel Service Unit / Data Service Unit)
Handles tasks in the place of other machines on the network
HTTP
Handles e-mail functions
18. Which one of the following choices is the MOST secure place to store tape backups?
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Internet Information Services
In a locked room in an offsite location
19. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)?
WINS (Windows Internet Name Service)
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
802.11b
3.1
20. Fault Tolerance
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
SMTP Server
Extranet
21. What is BGMP?
53
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Forward the packets to all ports except the one that originated the request
Internet Information Services
22. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
Extranet
Internet Information Services
User Datagram Protocol. This protocol is connectionless and routable.
Multiple Link Interface
23. IPX/SPX means...
Bayonet-Neill-Concelman or British Naval Connector
Port Address Translator
Internetwork Packet Exchange/Sequenced Packet Exchange
This IP (Internet Protocol) address cannot be pinged remotely.
24. GSM means...
TFTP (Trivial File Transfer Protocol)
DNS
Provides remote users with access to the network through modems and an IP connection
Global System for Mobile Communications
25. DC means...
Server Message Block OR Small-to-Midsize Business
Direct Current
Password Authentication Protocol
User Datagram Protocol. This protocol is connectionless and routable.
26. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
Forward the packets to all ports except the one that originated the request
TFTP (Trivial File Transfer Protocol)
CSU / DSU (Channel Service Unit / Data Service Unit)
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
27. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
Fully Qualified Domain Name
RDP/ Terminal Services
Lightweight Directory Access Protocol
Network and Transport
28. What is Unicast?
Remote Desktop Protocol
Network News Transfer Protocol
the NIC (Network Interface Card) is bad.
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
29. SNMP Means...
CSU / DSU (Channel Service Unit / Data Service Unit)
Hypertext transfer protocol
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Simple Network Management Protocol
30. Ten workstations numbered 1 through 10 are installed sequentially on a physical star network. The network uses a logical bus topology and is cabled using Category 3 UTP (Unshielded Twisted Pair). The cable to Workstation 3 has been severed. Which of
RDP/ Terminal Services
T1 (T-Carrier Level 1).
Internet Protocol
All workstations except Workstation 3 can communicate to each other.
31. In a fully Meshed network - every node has a connection to every other node - 7+6+5+4+3+2+1=28 Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
User Datagram Protocol
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
CSU / DSU (Channel Service Unit / Data Service Unit)
1
32. What is PPTP?
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Institute of Electrical and Electronics Engineers
Point to Point Tunneling Protocol
Periodically (randomly) blinking
33. A user would like to implement a secure ordering system on a web server. Which of the following protocols is installed?
It is an address assigned to a NIC (Network Interface Card).
161 & 162
Wireless LAN
SSL (Secure Sockets Layer)
34. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Sys Log (Unix) or Event Manager (Windows)
Hybrid hub
Presentation
Verification
35. Examples of valid WEP (Wired Equivalent Privacy) key lengths
Stores and dispenses files
40 bit - 128 bit - 64 bit
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
SSH
36. FDDI (Fiber Distributed Data Interface) operates at what speed?
802.2
Network File System
Challenge Handshake Authentication Protocol
100 Mbps (Megabits per second)
37. ICMP means...
Internet Control Message Protocol
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
All workstations except Workstation 3 can communicate to each other.
Global Positioning System
38. UDP Means...
Time domain reflectometer
User Datagram Protocol
Any device on the network that can ask for access to resources
100 Mbps (Megabits per second)
39. MPLS
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
MultiProtocol Label Switching
A striped set array with parity
Switches - bridges - and NICs (Network Interface Card)
40. A user connects to the companys intranet server via a VPN (Virtual Private Network) connection from a SOHO (Small Office / Home Office) using the broadband service. One day - the user cannot successfully connect to the VPN (Virtual Private Network) a
Basic Input/Output System
Integrated Services digital Network
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
172.192.4.256
41. SSID Means...
RDP/ Terminal Services
SMTP Server
Service Set Identifier
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
42. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
Gateway
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
There will be no Internet access.
43. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?
PPP (Point-to-Point Protocol)
Peer-To-Peer and Client-Server
72.16.16.1
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
44. List the benefits of a bus topology
ifconfig
Extranet
Address Resolution Protocol. Has no error control.
Easy to install - Inexpensive - Less actual cable required
45. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
netstat and ping
Gateway
Direct Current
Remote Desktop Protocol
46. Which one of the following is a purpose for subnetting?
Provides remote users with access to the network through modems and an IP connection
To decrease network congestion Answer: D
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
169.254.1.1
47. List the drawbacks of a ring topology
Institute of Electrical and Electronics Engineers
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Network File System
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
48. ISP Means...
Internet Service Provider
Internet Control Message Protocol
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
In a locked room in an offsite location
49. DHCP means...
Dynamic Host Configuration Protocol
Port 20 must also be unblocked.
135-139
Hypertext transfer protocol over secure sockets layer.
50. What is PAP?
Password Authentication Protocol
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Point-to-Point Tunneling Protocol
Trivial File Transfer Protocol