SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
The amber light is flashing occasionally and the green light is lit steadily.
Network Interface Card
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
encapsulating the data payload.
2. GUI means
raphical User Interface
Physical
Global Positioning System
161 & 162
3. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
BootP (Boot Protocol)
Manages printers on the network
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
An exact duplicate of the infrastructure is mirrored offsite.
4. DNS means...
Domain Name Service OR Domain Name Server
Network and Transport
Data Link
Disk Operating System or Denial of Service
5. 802.11 security is defined in...
The 'memo maker' that sends and receives paperless faxes over the network
Transport
802.11i
Media Access Unit - Media attachment Unit
6. Host
Simple Network Management Protocol
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Any network device with an IP address
TCP / IP (Transmission Control Protocol / Internet Protocol)
7. A new intranet web server has been installed for a company. The clients access the intranet server by its DNS (Domain Name Service) name. To automatically change the clients to connect to the new server - an administrator modifies the DNS (Domain Nam
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
SMTP Server
Secure Sockets Layer
Proxy Server
8. NFS Means...
Point-to-Point Protocol
Hypertext transfer protocol
Network File System
ICMP (Internet Control Message Protocol)
9. What is RIP?
IMAP (Mail Client)
Verification
Transmission Control Protocol/Internet Protocol
Routing Internet Protocol
10. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Extranet
Institute of Electrical and Electronics Engineers
Proxy Server
11. Fax Server
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. MAN Means...
SSH
Metropolitan Area Network
Any network device with an IP address
Bridge
13. What is on Port 23?
Secure Shell
Telnet
Switches - bridges - and NICs (Network Interface Card)
RDP/ Terminal Services
14. What is EAP? What is it used for?
PPP (Point-to-Point Protocol)
To decrease network congestion Answer: D
Network and Transport
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
15. On what Port is POP3?
110
User Datagram Protocol
Wireless Access Point
Internet mail access protocol
16. Upon which devices can NAT (Network Address Translation) be used?
Firewall
Network Time Protocol
Proxy Server
SSL (Secure Sockets Layer)
17. To increase the number of available IP (Internet Protocol) addresses - IPv6 (Internet Protocol version 6) uses which one of the following options?
128 bit addresses
Network Address Translation
WINS (Windows Internet Name Service)
Simple Network Management Protocol
18. A user has set up filtering on an Internet router. The local SMTP (Simple Mail Transfer Protocol) server has stopped sending or receiving messages from the Internet. What is the cause of the problem?
There will be no Internet access.
PPP (Point-to-Point Protocol)
Windows Internet Name Service
The Internet router is blocking port 25.
19. What is on Port 80?
HTTP
These are the FTP ports. Port 20 handles data and Port 21 provides control.
TFTP (Trivial File Transfer Protocol)
Transmission Control Protocol
20. A star network that uses several cable types must use which hub type in order to accommodate all client machines?
Transmission Control Protocol/Internet Protocol
There will be no Internet access.
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Hybrid hub
21. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)?
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
802.11
Point-to-Point Tunneling Protocol
Stores and dispenses files
22. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by...
L2TP (Layer 2 Tunneling Protocol)
passing a username and password in plaintext.
25
Network and Transport
23. MAC Means...
The device ID (Identification)
cold site.
Media Access Control
RDP/ Terminal Services
24. Logical Topology
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
TFTP (Trivial File Transfer Protocol)
A network map showing exactly how data moves through the network.
23
25. NNTP Means...
20 & 21
Application
Network News Transfer Protocol
The file has been opened by another user and is open for read only.
26. The Spanning-Tree Protocol allows for redundancy of what networking device?
Bridge
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Multipurpose Internet Mail Extension
Transmission Control Protocol
27. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
CSU / DSU (Channel Service Unit / Data Service Unit)
TFTP (Trivial File Transfer Protocol)
2
28. DOS means...
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Service Set Identifier
Disk Operating System or Denial of Service
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
29. Telephony Server
Routing Information Protocol
100 Mbps (Megabits per second)
SMTP Server
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
30. Which protocol is the fastest file transfer protocol?
TFTP (Trivial File Transfer Protocol)
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
An old microwave oven is being used in the break room which causes interference with the access point.
WINS (Windows Internet Name Service)
31. UDP Means...
Network News Transfer Protocol
25
User Datagram Protocol
Peer-To-Peer and Client-Server
32. LDAP means...
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Wireless Fidelity
25
Lightweight Directory Access Protocol
33. Which one of the following options is a security standard for 802.11?
802.11
1433
Routing Internet Protocol
WEP (Wired Equivalent Privacy)
34. A network administrator is troubleshooting connectivity from a client machine. An error message that reads 'Page Cannot be Displayed' is shown in the browser whenever a FQDN (Fully Qualified Domain Name) is typed in the address bar. However - if the
Domain Name Service OR Domain Name Server
53
Access Control List
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
35. HTTP Means...
Hypertext transfer protocol
Point to Point Tunneling Protocol
Wired Equivalent Privacy
encapsulating the data payload.
36. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
netstat and ping
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
rlogin
ping
37. PPP Means...
Network Address Translator
Point-to-Point Protocol
RDP/ Terminal Services
Forward the packets to all ports except the one that originated the request
38. What is L2TP? What is significant about this protocol?
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
New Technology File System
Network Access Control
Trivial File Transfer Protocol
39. List the drawbacks of a ring topology
Hypertext transfer protocol
A 2.4 GHz (Gigahertz) cordless telephone is in use.
128 bit addresses
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
40. IIS Means...
WINS (Windows Internet Name Service)
550 meters (1 -804.46 feet)
Application
Internet Information Services
41. What is on Port 8080?
Proxy Server
In the LAN (Local Area Network)
Direct Current
PPP (Point-to-Point Protocol)
42. IEEE means...
Internet mail access protocol
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Institute of Electrical and Electronics Engineers
10 GBASE-LR
43. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
53
rp
Two or more connected computers that can share resources
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
44. File Server
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
Stores and dispenses files
Simple Network Management Protocol
Packets from entering and leaving a network
45. AC means...
Basic Rate Interface
Wired Equivalent Privacy
802.11
Alternating Current
46. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)?
They are connected to a switch when trying to capture packets.
Proxy Server
larger subnet masks.
802.11b
47. WEP Means...
Wired Equivalent Privacy
Stores and dispenses files
User Datagram Protocol. This protocol is connectionless and routable.
Wireless Fidelity
48. Which one of the following communication protocols does a UNIX system primarily rely on?
TCP / IP (Transmission Control Protocol / Internet Protocol)
Firewall
Remote Desktop Protocol
Address Resolution Protocol. Has no error control.
49. What is QoS?
Quality of Service
Presentation
User Datagram Protocol
They are connected to a switch when trying to capture packets.
50. PPTP Means...
Network and Transport
802.11i
Internet Protocol
Point-to-Point Tunneling Protocol