SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?
Internet Service Provider
161 & 162
Quality of Service
Gateway
2. Which one of the following security protocols creates a secure connection over the Internet?
Wireless Fidelity
3.1
The Internet router is blocking port 25.
L2TP (Layer 2 Tunneling Protocol)
3. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT...
Dynamic Host Configuration Protocol
SSL (Secure Sockets Layer)
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
DNS
4. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by...
passing a username and password in plaintext.
Metropolitan Area Network
An old microwave oven is being used in the break room which causes interference with the access point.
172.192.4.256
5. What is on Port 143?
rlogin
IMAP (Mail Client)
Alternating Current
POP3
6. HTML means...
Secure Shell
Network Interface Card
Port 20 must also be unblocked.
Hypertext Markup Language
7. DNS means...
Network Address Translator
Domain Name Service OR Domain Name Server
Media Access Control
550 meters (1 -804.46 feet)
8. What enables a UNIX computer to access exported file systems from other UNIX computers?
NFS (Network File System)
An eight-position connector which uses UTP (Unshielded Twisted Pair).
MT-RJ (Mechanical Transfer-Registered Jack)
Internet Protocol
9. Describe a star topology
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
gateway.
10. BIOS Means...
802.1x
SMTP Server
Basic Input/Output System
1000BASE-CX
11. A user complains that they can no longer access resources on the network. The user is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What is the problem?
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Sys Log (Unix) or Event Manager (Windows)
HTTP
The analyzer is functioning properly.
12. What is IPSEC? Why is it significant?
Implement VLANs (Virtual Local Area Network)
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Internet Protocol Security. This is the defacto standard for VPN security.
Wireless Protected Access
13. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. What is Multicast Transmission?
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
2.4 GHz (Gigahertz).
Handles e-mail functions
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
15. Which one of the following options is a security standard for 802.11?
3389
Hypertext Markup Language
New Technology File System
WEP (Wired Equivalent Privacy)
16. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Wireless Access Point
550 meters (1 -804.46 feet)
17. An administrator changes the lease time of the DHCP (Dynamic Host Configuration Protocol) scope from one week to one day. What affect will this have on the end users?
The users will not be affected by the change.
802.2
Central Processing unit
Address Resolution Protocol. Has no error control.
18. Which UNIX service provides interoperability with Windows file and print sharing?
SMB (Server Message Block)
Transmission Control Protocol/Internet Protocol
Internet Control Message Protocol
Application
19. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
Application
3389
1000BASE-LX and10 GBASE-LR
Digital Subscriber Line
20. What is on Port 69?
Multipurpose Internet Mail Extension
TFTP (Trivial File Transfer Protocol)
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Proxy
21. Network
Two or more connected computers that can share resources
Check the connection from the WAP (Wireless Access Point) to the network
72.16.16.1
Secure Shell
22. NTFS Means...
The users will not be affected by the change.
New Technology File System
10 GBASE-LR
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
23. MAC Means...
Media Access Control
Any network device with an IP address
100BASE-FX Answer: D
L2TP (Layer 2 Tunneling Protocol)
24. A network has grown to include seventy 24 port Ethernet switches and has decreased in performance steadily as new switches are added. What adjustments can be made to the infrastructure to improve the performance?
Implement VLANs (Virtual Local Area Network)
Dynamic Host Configuration Protocol
larger subnet masks.
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
25. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
CSU / DSU (Channel Service Unit / Data Service Unit)
The analyzer is functioning properly.
DNS
69
26. Connecting a LAN (Local Area Network) to a mainframe can be accomplished using a...
gateway.
It is an address assigned to a NIC (Network Interface Card).
Secure Sockets Layer
80
27. What is on Port 1433?
1
Internet Protocol
SQL Server
Manages network applications
28. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
User Datagram Protocol. This protocol is connectionless and routable.
Port 20 must also be unblocked.
rlogin
29. POP Means...
PPP (Point-to-Point Protocol)
Post Office Protocol
DNS
128 bit addresses
30. Which of the following choices describes an RJ-45 (Registered Jack) connector?
netstat
A 2.4 GHz (Gigahertz) cordless telephone is in use.
An eight-position connector which uses UTP (Unshielded Twisted Pair).
bytes 1-3
31. URL Means...
Uniform Resource Locator
Network Time Protocol
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Light Emitting Diode
32. PSTN Means...
User Datagram Protocol. This protocol is connectionless and routable.
Server Message Block OR Small-to-Midsize Business
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Public Switched Telephone Network
33. NetBIOS Means...
In the LAN (Local Area Network)
Networked Basic Input/Output System
Firewall
Transmission Control Protocol
34. Client-Server Networks
Hypertext transfer protocol
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
192.168.96.254
cold site.
35. NNTP Means...
Wireless Access Point
Wireless Protected Access
Network News Transfer Protocol
802.11a.
36. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
10 GBASE-LR
The amber light is flashing occasionally and the green light is lit steadily.
Routing Information Protocol
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
37. NFS Means...
Network File System
ICMP (Internet Control Message Protocol)
Windows Internet Name Service
Networked Basic Input/Output System
38. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Wireless LAN
Presentation
Simple Network Management Protocol
69
39. PPTP Means...
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
80
Point-to-Point Tunneling Protocol
Authentication
40. The Spanning-Tree Protocol allows for redundancy of what networking device?
As a way to share resources and information
Bridge
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
Application
41. POP3 Means...
Post Office Protocol 3
Domain Name Service OR Domain Name Server
389
cold site.
42. Examples of valid WEP (Wired Equivalent Privacy) key lengths
40 bit - 128 bit - 64 bit
802.11a.
1000BASE-CX
Server Message Block OR Small-to-Midsize Business
43. Which of the following is used to translate NetBIOS (Network Basic Input / Output System) names
WINS (Windows Internet Name Service)
10
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
Extranet
44. A network administrator is troubleshooting connectivity from a client machine. An error message that reads 'Page Cannot be Displayed' is shown in the browser whenever a FQDN (Fully Qualified Domain Name) is typed in the address bar. However - if the
nslookup
Network News Transfer Protocol
ping
53
45. On what Port is Sys Log/ Event Manager?
Internet Control Message Protocol
514
Transmission Control Protocol
25
46. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
SMTP Server
80
NFS (Network File System)
1000BASE-CX
47. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
The 'memo maker' that sends and receives paperless faxes over the network
MAC (Media Access Control) address
Port Address Translator
HTTP
48. What is on Ports 161 and 162?
Port 161 is SNMP and Port 162 is the SNMP Manager
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Uniform Resource Locator
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
49. DHCP means...
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
Dynamic Host Configuration Protocol
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
New Technology File System
50. IPX Means...
Network News Transfer Protocol
Internetwork packet exchange
Token passing
Bridge