SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is the minimum number of hard drives required to implement RAID 0 (Redundant Array of Independent Disks)?
2
Transmission Control Protocol
A long length of antenna extension cable
802.11
2. What are the two main network types?
The device ID (Identification)
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
MultiProtocol Label Switching
Peer-To-Peer and Client-Server
3. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
25
SSL (Secure Sockets Layer)
Electromagnetic Interference
Network Address Translator
4. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
Network and Transport
Gateway
L2TP (Layer 2 Tunneling Protocol)
File Transfer Protocol
5. Servers
6. WAP Means...
SSL (Secure Sockets Layer)
Wireless Access Point
Transmission Control Protocol/Internet Protocol
53
7. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Intern
192.168.96.254
Direct Current
HTTP
BootP (Boot Protocol)
8. File Server
Bayonet-Neill-Concelman or British Naval Connector
Stores and dispenses files
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
WINS (Windows Internet Name Service)
9. Client Machine
SMB (Server Message Block)
It is an address assigned to a NIC (Network Interface Card).
Any device on the network that can ask for access to resources
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
10. An administrator changes the lease time of the DHCP (Dynamic Host Configuration Protocol) scope from one week to one day. What affect will this have on the end users?
The users will not be affected by the change.
netstat
802.11
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
11. Which of the following choices describes an RJ-45 (Registered Jack) connector?
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
An eight-position connector which uses UTP (Unshielded Twisted Pair).
172.192.4.256
NetBios
12. This is not a valid IP (Internet Protocol) addresses
PPP (Point-to-Point Protocol)
172.192.4.256
Post Office Protocol 3
Access Control List
13. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a...
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Periodically (randomly) blinking
Telnet
gateway.
14. Which protocol does a diskless workstation use to obtain a network address?
Secure Shell
DNS (Domain Name Service) server settings
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
BootP (Boot Protocol)
15. POP Means...
Hypertext transfer protocol over secure sockets layer.
Post Office Protocol
SSL (Secure Sockets Layer)
Check the connection from the WAP (Wireless Access Point) to the network
16. On a switched Ethernet network that is operating perfectly - what is the state in which a user will find the activity LED (Light Emitting Diode)?
Periodically (randomly) blinking
Asynchronous Transfer Mode
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
IMAP (Mail Client)
17. What is on Port 111?
POP3
Port 20 must also be unblocked.
SUN RPC
Bridge
18. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
Telnet
Central Processing unit
Implement VLANs (Virtual Local Area Network)
Proxy server
19. WEP Means...
Wired Equivalent Privacy
172.192.4.256
Internet Protocol
In a locked room in an offsite location
20. On what Port is SNMP?
20 & 21
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
161 & 162
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
21. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
CSU / DSU (Channel Service Unit / Data Service Unit)
rp
WEP (Wired Equivalent Privacy)
Application
22. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model?
Provides remote users with access to the network through modems and an IP connection
D. Switch and bridge
Bus
Bridge
23. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) copper cable standard?
SMTP Server
Primary Rate Interface
Easy to install - Inexpensive - Less actual cable required
1000BASE-CX
24. On what Port is RDP?
An old microwave oven is being used in the break room which causes interference with the access point.
The 'memo maker' that sends and receives paperless faxes over the network
Transmission Control Protocol
3389
25. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
Asynchronous Transfer Mode
Central Processing unit
10 GBASE-LR
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
26. Given the following output - which utility was used? Default Server: bigserver.datacenter.com Address: 4.12.18.1
Institute of Electrical and Electronics Engineers
nslookup
Quality of Service
An exact duplicate of the infrastructure is mirrored offsite.
27. TFTP Means...
Firewall
Post Office Protocol
Trivial File Transfer Protocol
An exact duplicate of the infrastructure is mirrored offsite.
28. A star network that uses several cable types must use which hub type in order to accommodate all client machines?
Hybrid hub
VPN (Virtual Private Network)
Multiple Link Interface
1000BASE-LX and10 GBASE-LR
29. Name the seven most common physical topologies
NetBios
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
72.16.16.1
Multipurpose Internet Mail Extension
30. Mail Server
Handles e-mail functions
cold site.
Internet Control Message Protocol
Open Source Path First - this is a routing protocol
31. What is UDP? What are some of its attributes?
100BASE-FX Answer: D
Proxy server
User Datagram Protocol. This protocol is connectionless and routable.
192.168.96.254
32. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
Open Source Path First - this is a routing protocol
20 & 21
encapsulating the data payload.
Electromagnetic Interference
33. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
The file has been opened by another user and is open for read only.
Challenge Handshake Authentication Protocol
34. IEEE means...
10 GBASE-LR
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Institute of Electrical and Electronics Engineers
netstat
35. Which one of the following options is a security standard for 802.11?
Hypertext transfer protocol over secure sockets layer.
WEP (Wired Equivalent Privacy)
Point-to-Point Tunneling Protocol
Proxy Server
36. What is BGMP?
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Transmission Control Protocol/Internet Protocol
802.1x
128 bit addresses
37. Which one of the following is true concerning bridges and their forwarding decisions?
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Challenge Handshake Authentication Protocol
Integrated Services digital Network
Quality of Service
38. Fault Tolerance
Client - protocol - and adapter
Exterior Gateway Protocol
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Primary Rate Interface
39. Which protocol could be used by a VPN (Virtual Private Network)?
CSU / DSU (Channel Service Unit / Data Service Unit)
Fully Qualified Domain Name
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
PPTP (Point-to-Point Tunneling Protocol)
40. Disk mirroring is also known as RAID ___...
1
Windows Internet Name Service
In a locked room in an offsite location
RDP/ Terminal Services
41. Which one of the following choices is the MOST secure place to store tape backups?
BootP (Boot Protocol)
In a locked room in an offsite location
Port 161 is SNMP and Port 162 is the SNMP Manager
Transmission Control Protocol/Internet Protocol
42. FTP Means
File Transfer Protocol
SQL Server
Peer-To-Peer and Client-Server
Periodically (randomly) blinking
43. What is on Port 80?
User Datagram Protocol. This protocol is connectionless and routable.
HTTP
Hybrid hub
Trivial File Transfer Protocol
44. SNMP Means...
Simple Network Management Protocol
Any device on the network that can ask for access to resources
Connect Workstation 6 and Workstation 2 using a barrel connector
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
45. This is not an IP (Internet Protocol) addresses.
72.16.16.1
Sys Log (Unix) or Event Manager (Windows)
1000BASE-CX
TFTP (Trivial File Transfer Protocol)
46. Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology. Workstation 1 fails. How can the network administrator remove Workstation 1 for service without moving the other workstations?
Connect Workstation 6 and Workstation 2 using a barrel connector
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
111
Remote Desktop Protocol
47. ACL means...
25
Access Control List
169.254.1.1
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
48. On what Port is LDAP?
72.16.16.1
Basic Rate Interface
389
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
49. What is on Port 443?
raphical User Interface
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
This IP (Internet Protocol) address cannot be pinged remotely.
HTTPS/ SSL
50. A firewall can be used to prevent which of the following?
Packets from entering and leaving a network
User Datagram Protocol
172.192.4.256
SQL Server