SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. SSL Means...
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
WINS (Windows Internet Name Service)
The users will not be affected by the change.
Secure Sockets Layer
2. 802.11 security is defined in...
802.11i
Select the most probable cause
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
VPN (Virtual Private Network)
3. What is on Port 443?
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
HTTPS/ SSL
161 & 162
ifconfig
4. What is on Port 80?
Network Interface Card
Gateway
HTTP
Proxy
5. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?
TFTP (Trivial File Transfer Protocol)
PPP (Point-to-Point Protocol)
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
User Datagram Protocol. This protocol is connectionless and routable.
6. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
Network Address Translator
Reverse Address Resolution Protocol.
The analyzer is functioning properly.
Stores and dispenses files
7. What is on Port 25?
PPTP (Point-to-Point Tunneling Protocol)
Put a router between the two network segments
Secure Sockets Layer
SMTP Server
8. Upon which devices can NAT (Network Address Translation) be used?
Firewall
Application
File Transfer Protocol
Networked Basic Input/Output System Extended User Interface
9. WLAN Means...
Point to Point Protocol
69
Wireless LAN
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
10. What is on Port 8080?
Internetwork packet exchange
Routing Internet Protocol
nslookup
Proxy Server
11. What is on Port 111?
SUN RPC
The 'memo maker' that sends and receives paperless faxes over the network
L2TP (Layer 2 Tunneling Protocol)
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
12. Name the seven most common physical topologies
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
User Datagram Protocol. This protocol is connectionless and routable.
514
13. Which one of the following options is a security standard for 802.11?
WEP (Wired Equivalent Privacy)
Reverse Address Resolution Protocol.
80
192.168.96.254
14. HTTPS means...
161 & 162
Hypertext transfer protocol over secure sockets layer.
nslookup
A 2.4 GHz (Gigahertz) cordless telephone is in use.
15. Client-Server Networks
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
MAC (Media Access Control) address
nslookup
16. What are the two main network types?
Fully Qualified Domain Name
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
Peer-To-Peer and Client-Server
PPTP (Point-to-Point Tunneling Protocol)
17. What is the minimum number of hard drives required to implement RAID 0 (Redundant Array of Independent Disks)?
A striped set array with parity
2
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
rlogin
18. NTFS Means...
Internetwork packet exchange
143
New Technology File System
SMB (Server Message Block)
19. A workstation with a static IP (Internet Protocol) address can print and authenticate to a server - but cannot browse to www.comptia.org. What is the FIRST item to troubleshoot?
DNS (Domain Name Service) server settings
PPTP (Point-to-Point Tunneling Protocol)
User Datagram Protocol
135-139
20. Which protocol could be used by a VPN (Virtual Private Network)?
Switches - bridges - and NICs (Network Interface Card)
Periodically (randomly) blinking
PPTP (Point-to-Point Tunneling Protocol)
Industry Standards Organization
21. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)?
Wireless Protected Access
Networked Basic Input/Output System
Internet Service Provider
100BASE-FX Answer: D
22. TDR means...
All workstations except Workstation 3 can communicate to each other.
Hypertext Markup Language
Time domain reflectometer
BootP (Boot Protocol)
23. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
Multiple Link Interface
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
20 & 21
24. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
550 meters (1 -804.46 feet)
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
161 & 162
Global System for Mobile Communications
25. What is UDP? What are some of its attributes?
25
User Datagram Protocol. This protocol is connectionless and routable.
Internet mail access protocol
Internet Protocol
26. What is EGP?
2.4 GHz (Gigahertz).
Internet mail access protocol
Exterior Gateway Protocol
A striped set array with parity
27. Physical Topology
Transport
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Trivial File Transfer Protocol
SUN RPC
28. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
raphical User Interface
TFTP (Trivial File Transfer Protocol)
Two or more connected computers that can share resources
29. Which one of the following UNIX commands is similar to Telnet and used for terminal emulation?
rlogin
netstat and ping
Hypertext Markup Language
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
30. Fault Tolerance
The Internet router is blocking port 25.
The file has been opened by another user and is open for read only.
traceroute
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
31. TCP/IP Means;
Presentation
Transmission Control Protocol/Internet Protocol
Firewall
SMTP Server
32. NTP means...
This IP (Internet Protocol) address cannot be pinged remotely.
An exact duplicate of the infrastructure is mirrored offsite.
Network Time Protocol
Plain Old Telephone Service
33. IEEE means...
Bayonet-Neill-Concelman or British Naval Connector
Institute of Electrical and Electronics Engineers
ICMP (Internet Control Message Protocol)
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
34. Remote Access Server
Put a router between the two network segments
gateway.
A long length of antenna extension cable
Provides remote users with access to the network through modems and an IP connection
35. A network has grown to include seventy 24 port Ethernet switches and has decreased in performance steadily as new switches are added. What adjustments can be made to the infrastructure to improve the performance?
Port Address Translator
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
10 GBASE-LR
Implement VLANs (Virtual Local Area Network)
36. When one connection to a host fails in a full mesh network - it means...
Stores and dispenses files
All hosts can communicate.
Multiple Link Interface
72.16.16.1
37. A firewall can be used to prevent which of the following?
SQL Server
Packets from entering and leaving a network
T1 (T-Carrier Level 1).
Client - protocol - and adapter
38. What is on Ports 135-139?
NetBios
A striped set array with parity
Transmission Control Protocol
These are the FTP ports. Port 20 handles data and Port 21 provides control.
39. The 802.11 frequency band is...
Address Resolution Protocol. Has no error control.
2.4 GHz (Gigahertz).
Application
In a locked room in an offsite location
40. List the benefits of a bus topology
Any device on the network that can ask for access to resources
Easy to install - Inexpensive - Less actual cable required
Internet Protocol
Routing Information Protocol
41. Which of the following are classified as Layer 2 devices?
Light Emitting Diode
Switches - bridges - and NICs (Network Interface Card)
ifconfig
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
42. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
Port 20 must also be unblocked.
1000BASE-CX
Stores and dispenses files
Central Processing unit
43. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model?
Asynchronous Transfer Mode
D. Switch and bridge
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
802.11i
44. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
A long length of antenna extension cable
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
The users will not be affected by the change.
45. Application Server
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Manages network applications
Network and Transport
bytes 1-3
46. All of the following Novell NetWare operating systems support NDS (NetWare Directory Services) natively EXCEPT...
Network Time Protocol
3.1
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Networked Basic Input/Output System
47. Company A has two networks - one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to all
Industry Standards Organization
Put a router between the two network segments
Media Access Control
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
48. In a fully Meshed network - every node has a connection to every other node - 7+6+5+4+3+2+1=28 Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
Challenge Handshake Authentication Protocol
Digital Subscriber Line
CSU / DSU (Channel Service Unit / Data Service Unit)
User Datagram Protocol
49. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
ping
Transport
Proxy server
1
50. What is IP?
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
raphical User Interface
Internet Protocol
Physical