SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What enables a UNIX computer to access exported file systems from other UNIX computers?
Firewall
Authentication
NFS (Network File System)
802.11
2. What is IPSEC? Why is it significant?
Fully Qualified Domain Name
Telnet
NetBios
Internet Protocol Security. This is the defacto standard for VPN security.
3. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
MultiProtocol Label Switching
Multipurpose Internet Mail Extension
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Easy to install - Inexpensive - Less actual cable required
4. ISP Means...
172.192.4.256
Internet Service Provider
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Client - protocol - and adapter
5. What is Unicast?
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
53
Firewall
6. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
Proxy server
40 bit - 128 bit - 64 bit
25
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
7. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
A long length of antenna extension cable
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
The analyzer is functioning properly.
Network and Transport
8. Application Server
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Manages network applications
Routing Internet Protocol
Open Source Path First - this is a routing protocol
9. Examples of valid WEP (Wired Equivalent Privacy) key lengths
40 bit - 128 bit - 64 bit
Handles e-mail functions
Hybrid hub
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
10. Which of the following connectors will be required for a RAS (Remote Access Service) server accepting four incoming dial-up connections to connect to the PSTN (Public Switched Telephone Network)?
netstat
23
Handles e-mail functions
RJ-11 (Registered Jack)
11. Which one of the following options is required for a client workstation to connect to a network resource?
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Client - protocol - and adapter
POP3
Point-to-Point Protocol
12. On what Port is RDP?
Network Time Protocol
Media Access Control
3389
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
13. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
SQL Server
135-139
VPN (Virtual Private Network)
Check the connection from the WAP (Wireless Access Point) to the network
14. Which media access method is used for an IEEE (Institute of Electrical and Electronics Engineers) 802.5 network?
rp
SMTP Server
New Technology File System
Token passing
15. What is on Port 1433?
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Internetwork packet exchange
There will be no Internet access.
SQL Server
16. SSH Means...
Secure Shell
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
23
Easy to install - Inexpensive - Less actual cable required
17. Which of the following methods transfers files with the use of a UDP (User Datagram Protocol)?
TFTP (Trivial File Transfer Protocol)
Exterior Gateway Protocol
Digital Subscriber Line
Public Switched Telephone Network
18. WEP Means...
Plain Old Telephone Service
Network File System
Wired Equivalent Privacy
Simple Network Management Protocol
19. What is EAP? What is it used for?
Hybrid hub
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
BootP (Boot Protocol)
10
20. LDAP means...
Client - protocol - and adapter
Lightweight Directory Access Protocol
Quality of Service
CSU / DSU (Channel Service Unit / Data Service Unit)
21. BIOS Means...
Network Address Translator
Manages printers on the network
Basic Input/Output System
Put a router between the two network segments
22. GUI means
This IP (Internet Protocol) address cannot be pinged remotely.
raphical User Interface
Primary Rate Interface
passing a username and password in plaintext.
23. On what Port is LDAP?
SSL (Secure Sockets Layer)
389
Network Interface Card
All hosts can communicate.
24. The Spanning-Tree Protocol allows for redundancy of what networking device?
IMAP (Mail Client)
Global Positioning System
Bridge
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
25. What is IP?
Network News Transfer Protocol
Internet Protocol
TFTP (Trivial File Transfer Protocol)
Alternating Current
26. Company A has two networks - one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to all
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Put a router between the two network segments
DNS
CSU / DSU (Channel Service Unit / Data Service Unit)
27. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
PPP (Point-to-Point Protocol)
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
1000BASE-CX
raphical User Interface
28. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)?
The analyzer is functioning properly.
161 & 162
HTTP
100BASE-FX Answer: D
29. ISO Means...
Industry Standards Organization
Disk Operating System or Denial of Service
Lightweight Directory Access Protocol
NetBios
30. On what Port is SNMP?
1000BASE-LX and10 GBASE-LR
Industry Standards Organization
There will be no Internet access.
161 & 162
31. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by...
It is an address assigned to a NIC (Network Interface Card).
passing a username and password in plaintext.
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Light Emitting Diode
32. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. On what Port is TFTP?
143
69
ifconfig
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
34. An employee needs to access the internal secure company web site from a hotel. The employee will need which of the following connections?
rlogin
Internet connection
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Manages network applications
35. On what Port is the SMTP Server?
23
Sys Log (Unix) or Event Manager (Windows)
25
New Technology File System
36. What is on Port 111?
Hypertext transfer protocol
MultiProtocol Label Switching
SUN RPC
110
37. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
Internetwork packet exchange
HTTPS/ SSL
There will be no Internet access.
Bridge
38. Fax Server
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. What is on Port 69?
Network Interface Card
Integrated Services digital Network
TFTP (Trivial File Transfer Protocol)
802.11i
40. A user connects to the companys intranet server via a VPN (Virtual Private Network) connection from a SOHO (Small Office / Home Office) using the broadband service. One day - the user cannot successfully connect to the VPN (Virtual Private Network) a
Two or more connected computers that can share resources
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
A. 18 -000 feet (5 -486.4 meters)
41. All of the following options transmit data over a modem EXCEPT...
T1 (T-Carrier Level 1).
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Multipurpose Internet Mail Extension
Two or more connected computers that can share resources
42. What is PAP?
Wireless Access Point
Bluetooth enabled cell phones
Password Authentication Protocol
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
43. Which command will produce the following output? ethoLink encap : Ethernet HWaddr: 00:80:C8:D6:74:43 inet adder : 4.150.6.3 Bcast : 4.255.255.255 Mask: 255.0.0.0
ifconfig
Network News Transfer Protocol
8080
10
44. PPTP Means...
80
Asynchronous Transfer Mode
SQL Server
Point-to-Point Tunneling Protocol
45. ISDN means...
PPTP (Point-to-Point Tunneling Protocol)
Implement VLANs (Virtual Local Area Network)
Integrated Services digital Network
Basic Rate Interface
46. NetBIOS Means...
TCP / IP (Transmission Control Protocol / Internet Protocol)
Networked Basic Input/Output System
NetBios
A network map showing exactly how data moves through the network.
47. On what Port is the Proxy Server?
encapsulating the data payload.
8080
Access Control List
1000BASE-CX
48. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
An exact duplicate of the infrastructure is mirrored offsite.
traceroute
Authentication
Internet Protocol Security. This is the defacto standard for VPN security.
49. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
50. A firewall can be used to prevent which of the following?
Internetwork packet exchange
SSL (Secure Sockets Layer)
Packets from entering and leaving a network
Industry Standards Organization