SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)?
22
Authentication
100BASE-FX Answer: D
69
2. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
25
10
TFTP (Trivial File Transfer Protocol)
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
3. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
The device ID (Identification)
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
ICMP (Internet Control Message Protocol)
Put a router between the two network segments
4. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link layer?
Peer-To-Peer and Client-Server
ping
802.2
Lightweight Directory Access Protocol
5. On what Port is SSH?
Network Address Translator
TFTP (Trivial File Transfer Protocol)
Intrusion Detection System
22
6. What is EGP?
Internet connection
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Exterior Gateway Protocol
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
7. POP Means...
Internet Protocol Security. This is the defacto standard for VPN security.
Any device on the network that can ask for access to resources
D. Switch and bridge
Post Office Protocol
8. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)?
Physical
Application
802.11b
Local Area Network
9. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
Network and Transport
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
All workstations except Workstation 3 can communicate to each other.
Uniform Resource Locator
10. List the benefits of a bus topology
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Network File System
Easy to install - Inexpensive - Less actual cable required
11. If a destination address is not in a bridges forwarding table - what will the bridge do?
Metropolitan Area Network
23
They are connected to a switch when trying to capture packets.
Forward the packets to all ports except the one that originated the request
12. On what Port is the Proxy Server?
D. Switch and bridge
169.254.1.1
Internet Control Message Protocol
8080
13. Mail Server
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Bridge
Handles e-mail functions
Manages printers on the network
14. UDP Means...
Forward the packets to all ports except the one that originated the request
Service Set Identifier
User Datagram Protocol
Transmission Control Protocol/Internet Protocol
15. NAC means...
Institute of Electrical and Electronics Engineers
22
Network Access Control
In the LAN (Local Area Network)
16. What is DHCP? What is its key attribute?
Open Source Path First - this is a routing protocol
Internet Protocol
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Stores and dispenses files
17. What is on Port 3389?
Primary Rate Interface
T1 (T-Carrier Level 1).
Institute of Electrical and Electronics Engineers
RDP/ Terminal Services
18. WINS Means...
Windows Internet Name Service
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
netstat
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
19. WAP Means...
Wireless Access Point
Internetwork Packet Exchange/Sequenced Packet Exchange
Network Interface Card
DNS (Domain Name Service) server settings
20. The Spanning-Tree Protocol allows for redundancy of what networking device?
Point to Point Tunneling Protocol
Network and Transport
Bridge
Proxy
21. NFS Means...
Any device on the network that can ask for access to resources
Presentation
Network File System
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
22. IPX/SPX means...
Domain Name Service OR Domain Name Server
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Reverse Address Resolution Protocol.
Internetwork Packet Exchange/Sequenced Packet Exchange
23. What is EAP? What is it used for?
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
1000BASE-LX and10 GBASE-LR
A. 18 -000 feet (5 -486.4 meters)
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
24. What is QoS?
File Transfer Protocol
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Quality of Service
POP3
25. On what Port is LDAP?
Initial installation cost may be higher - One central single point of failure (the hub or other device)
larger subnet masks.
Quality of Service
389
26. A computer that is working on a network is unplugged and then plugged into another switch with a new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not come on. All of the following could be the source of the prob
25
the NIC (Network Interface Card) is bad.
Authentication
143
27. What is TCP?
Proxy server
Internetwork Packet Exchange/Sequenced Packet Exchange
Transmission Control Protocol
It is an address assigned to a NIC (Network Interface Card).
28. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
Direct Current
Hypertext transfer protocol over secure sockets layer.
Bus
A. 18 -000 feet (5 -486.4 meters)
29. Remote Access Server
RJ-11 (Registered Jack)
443
As a way to share resources and information
Provides remote users with access to the network through modems and an IP connection
30. HTTP Means...
192.168.96.254
CSU / DSU (Channel Service Unit / Data Service Unit)
The device ID (Identification)
Hypertext transfer protocol
31. ATM Means...
Asynchronous Transfer Mode
Basic Input/Output System
Light Emitting Diode
Internet Protocol
32. WLAN Means...
Implement VLANs (Virtual Local Area Network)
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
100BASE-FX Answer: D
Wireless LAN
33. What are the two main network types?
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Transmission Control Protocol
Peer-To-Peer and Client-Server
34. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
RJ-11 (Registered Jack)
Select the most probable cause
802.11b
PPTP (Point-to-Point Tunneling Protocol)
35. Application Server
As a way to share resources and information
SSH
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
Manages network applications
36. This is not an IP (Internet Protocol) addresses.
72.16.16.1
Global System for Mobile Communications
New Technology File System
Provides remote users with access to the network through modems and an IP connection
37. ISO Means...
Network News Transfer Protocol
2.4 GHz (Gigahertz).
The users will not be affected by the change.
Industry Standards Organization
38. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT...
72.16.16.1
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
111
135-139
39. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
The device ID (Identification)
Asynchronous Transfer Mode
69
This IP (Internet Protocol) address cannot be pinged remotely.
40. Describe a ring topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. TDR means...
Two or more connected computers that can share resources
Time domain reflectometer
23
Router
42. HTML means...
100BASE-FX Answer: D
Router
Hypertext Markup Language
netstat
43. PPP Means...
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Point-to-Point Protocol
SSL (Secure Sockets Layer)
An exact duplicate of the infrastructure is mirrored offsite.
44. HTTPS means...
192.168.96.254
Multiple Link Interface
ICMP (Internet Control Message Protocol)
Hypertext transfer protocol over secure sockets layer.
45. What is Multicast Transmission?
Hypertext Markup Language
bytes 1-3
Remote Desktop Protocol
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
46. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point?
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
SMB (Server Message Block)
Bluetooth enabled cell phones
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
47. A valid MAC (Media Access Control) address is how many bytes long?
53
traceroute
6
NFS (Network File System)
48. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
Transmission Control Protocol
passing a username and password in plaintext.
Internet Control Message Protocol
10 GBASE-LR
49. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
Wireless Access Point
Verification
There will be no Internet access.
Bridge
50. What is on Ports 161 and 162?
Port 161 is SNMP and Port 162 is the SNMP Manager
2
Authentication
Verification