SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?
Put a router between the two network segments
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Server Message Block OR Small-to-Midsize Business
Gateway
2. What is on Port 22?
Handles e-mail functions
Authentication
25
SSH
3. A star network that uses several cable types must use which hub type in order to accommodate all client machines?
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Fully Qualified Domain Name
Handles tasks in the place of other machines on the network
Hybrid hub
4. MAU means...
Internetwork Packet Exchange/Sequenced Packet Exchange
Media Access Unit - Media attachment Unit
Network File System
Open Source Path First - this is a routing protocol
5. On what Port is SQL Server?
Internet mail access protocol
Gateway
ifconfig
1433
6. NetBIOS Means...
802.1x
Networked Basic Input/Output System
Authentication
New Technology File System
7. FDDI (Fiber Distributed Data Interface) operates at what speed?
25
TFTP (Trivial File Transfer Protocol)
100 Mbps (Megabits per second)
The analyzer is functioning properly.
8. On a switched Ethernet network that is operating perfectly - what is the state in which a user will find the activity LED (Light Emitting Diode)?
Periodically (randomly) blinking
It is an address assigned to a NIC (Network Interface Card).
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Internet Service Provider
9. What part of an Ethernet MAC (Media Access Control) address designates the manufacturer of the NIC (Network Interface Card)?
bytes 1-3
Provides remote users with access to the network through modems and an IP connection
Post Office Protocol
Plain Old Telephone Service
10. CPU means...
Central Processing unit
Post Office Protocol 3
25
MT-RJ (Mechanical Transfer-Registered Jack)
11. Which protocol does a diskless workstation use to obtain a network address?
Any device on the network that can ask for access to resources
Public Switched Telephone Network
BootP (Boot Protocol)
10 GBASE-LR
12. What is OSPF?
Hypertext Markup Language
RDP/ Terminal Services
135-139
Open Source Path First - this is a routing protocol
13. TCP/IP Means;
Transmission Control Protocol/Internet Protocol
SQL Server
Internetwork packet exchange
Switches - bridges - and NICs (Network Interface Card)
14. Name the seven most common physical topologies
bytes 1-3
1000BASE-LX and10 GBASE-LR
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Exterior Gateway Protocol
15. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Authentication
User Datagram Protocol. This protocol is connectionless and routable.
25
16. In a fully Meshed network - every node has a connection to every other node - 7+6+5+4+3+2+1=28 Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
Bus
CSU / DSU (Channel Service Unit / Data Service Unit)
An old microwave oven is being used in the break room which causes interference with the access point.
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
17. MAC Means...
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Media Access Control
Select the most probable cause
18. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
CSU / DSU (Channel Service Unit / Data Service Unit)
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Extranet
ICMP (Internet Control Message Protocol)
19. Client-Server Networks
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Authentication
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
20. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
Uniform Resource Locator
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Bridge
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
21. Which of the following connectors will be required for a RAS (Remote Access Service) server accepting four incoming dial-up connections to connect to the PSTN (Public Switched Telephone Network)?
RJ-11 (Registered Jack)
netstat
Central Processing unit
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
22. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT...
Light Emitting Diode
Port Address Translator
2.4 GHz (Gigahertz).
larger subnet masks.
23. TDR means...
Time domain reflectometer
Uniform Resource Locator
Media Access Unit - Media attachment Unit
TCP / IP (Transmission Control Protocol / Internet Protocol)
24. List the drawbacks of a star topology
25
Firewall
Network Access Control
Initial installation cost may be higher - One central single point of failure (the hub or other device)
25. Which of the following is used to translate NetBIOS (Network Basic Input / Output System) names
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
550 meters (1 -804.46 feet)
netstat and ping
WINS (Windows Internet Name Service)
26. What is RIP?
1000BASE-LX and10 GBASE-LR
Simple Network Management Protocol
The amber light is flashing occasionally and the green light is lit steadily.
Routing Internet Protocol
27. Which one of the following options is required for a client workstation to connect to a network resource?
Challenge Handshake Authentication Protocol
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Client - protocol - and adapter
User Datagram Protocol. This protocol is connectionless and routable.
28. A client workstation can authenticate user names and passwords to which type of server?
BootP (Boot Protocol)
The file has been opened by another user and is open for read only.
MT-RJ (Mechanical Transfer-Registered Jack)
PDC (Primary Domain Controller)
29. DC means...
Telnet
IMAP (Mail Client)
100 Mbps (Megabits per second)
Direct Current
30. What enables a UNIX computer to access exported file systems from other UNIX computers?
NFS (Network File System)
cold site.
Port 20 must also be unblocked.
Alternating Current
31. SSH Means...
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
rlogin
Secure Shell
1
32. MIME means...
Time domain reflectometer
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
143
Multipurpose Internet Mail Extension
33. LAN Local Area Network
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
raphical User Interface
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
802.11b
34. Examples of valid WEP (Wired Equivalent Privacy) key lengths
Fully Qualified Domain Name
Port Address Translator
the NIC (Network Interface Card) is bad.
40 bit - 128 bit - 64 bit
35. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
Internet Protocol
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Manages network applications
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
36. Describe a bus topology
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Transport
SMTP Server
PDC (Primary Domain Controller)
37. ISP Means...
Internet Service Provider
Network and Transport
Proxy Server
1
38. A valid MAC (Media Access Control) address is how many bytes long?
6
Fully Qualified Domain Name
Media Access Control
encapsulating the data payload.
39. What is on Port 80?
Direct Current
1000BASE-CX
HTTP
2.4 GHz (Gigahertz).
40. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. Which one of the following standards has a maximum data rate of 11 Mbps (Megabits per second)?
Two or more connected computers that can share resources
802.11b
Multiple Link Interface
Wireless LAN
42. What is L2TP? What is significant about this protocol?
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Transmission Control Protocol
There will be no Internet access.
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
43. On what Port is LDAP?
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
389
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
RDP/ Terminal Services
44. Which protocol could be used by a VPN (Virtual Private Network)?
PPTP (Point-to-Point Tunneling Protocol)
The device ID (Identification)
PDC (Primary Domain Controller)
143
45. Which of the following are classified as Layer 2 devices?
111
Switches - bridges - and NICs (Network Interface Card)
100BASE-FX Answer: D
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
46. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses
Basic Input/Output System
Public Key Infrastructure
1000BASE-LX and10 GBASE-LR
Manages printers on the network
47. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
Multipurpose Internet Mail Extension
20 & 21
550 meters (1 -804.46 feet)
Port 20 must also be unblocked.
48. Why did we develop networking?
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
Hypertext transfer protocol
As a way to share resources and information
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
49. DHCP means...
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
802.2
Reverse Address Resolution Protocol.
Dynamic Host Configuration Protocol
50. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Point to Point Protocol
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.