SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which protocol is used for error reporting in concert with the IP protocol?
Quality of Service
ICMP (Internet Control Message Protocol)
The computer is set for DHCP (Dynamic Host Configuration Protocol) - but no DHCP (Dynamic Host Configuration Protocol) server is available for the network.
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
2. On what Port is RDP?
ICMP (Internet Control Message Protocol)
Challenge Handshake Authentication Protocol
3389
Transmission Control Protocol/Internet Protocol
3. NFS Means...
Router
Network File System
135-139
25
4. Which one of the following is true concerning bridges and their forwarding decisions?
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
PDC (Primary Domain Controller)
Bus
CSU / DSU (Channel Service Unit / Data Service Unit)
5. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by...
Access Control List
Service Set Identifier
Global System for Mobile Communications
passing a username and password in plaintext.
6. Upon which devices can NAT (Network Address Translation) be used?
Firewall
1
389
Routing Internet Protocol
7. A user complains that they can no longer access resources on the network. The user is unable to ping other nodes and ipconfig returns an IP (Internet Protocol) address that is not in the correct subnet. What is the problem?
As a way to share resources and information
Wired Equivalent Privacy
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
40 bit - 128 bit - 64 bit
8. On what Port is FTP?
20 & 21
1000BASE-CX
48 bits.
Metropolitan Area Network
9. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
Hypertext transfer protocol
10
53
Primary Rate Interface
10. WAP Means...
Wireless Access Point
SMB (Server Message Block)
Quality of Service
Exterior Gateway Protocol
11. CPU means...
Bus
Point to Point Protocol
Central Processing unit
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
12. What is CHAP?
Data Link
rlogin
Challenge Handshake Authentication Protocol
161 & 162
13. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model?
161 & 162
Select the most probable cause
Digital Subscriber Line
D. Switch and bridge
14. What is DHCP? What is its key attribute?
Simple Network Management Protocol
Transmission Control Protocol
Client - protocol - and adapter
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
15. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
161 & 162
1000BASE-CX
514
CSU / DSU (Channel Service Unit / Data Service Unit)
16. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
53
Routing Information Protocol
A 2.4 GHz (Gigahertz) cordless telephone is in use.
17. Which of the following is used to translate NetBIOS (Network Basic Input / Output System) names
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
WINS (Windows Internet Name Service)
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
53
18. What is on Port 143?
161 & 162
Provides remote users with access to the network through modems and an IP connection
IMAP (Mail Client)
Public Switched Telephone Network
19. A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning correctly and the network is up - which of the following will
WEP (Wired Equivalent Privacy)
Transport
The amber light is flashing occasionally and the green light is lit steadily.
An old microwave oven is being used in the break room which causes interference with the access point.
20. What is on Ports 135-139?
All workstations except Workstation 3 can communicate to each other.
gateway.
NetBios
169.254.1.1
21. A network administrator adds a router to create a new subnet. Which of the following network services requires configuration to accommodate NetBIOS (Network Basic Input / Output System) on the new network?
Electromagnetic Interference
Application
WINS (Windows Internet Name Service)
Internet Protocol Security. This is the defacto standard for VPN security.
22. Which UNIX service provides interoperability with Windows file and print sharing?
Multiple Link Interface
Wireless Fidelity
SMB (Server Message Block)
802.11b
23. Which one of the following devices connects a network segment to a public telephone network?
Plain Old Telephone Service
NFS (Network File System)
CSU / DSU (Channel Service Unit / Data Service Unit)
3389
24. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
802.11
gateway.
25. What is QoS?
CSU / DSU (Channel Service Unit / Data Service Unit)
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
111
Quality of Service
26. Which one of the following is a purpose for subnetting?
111
Multipurpose Internet Mail Extension
To decrease network congestion Answer: D
Secure Sockets Layer
27. Which one of the following provides a fault-tolerant storage system containing five disks and a single controller that will function if a single disk fails?
A striped set array with parity
Point-to-Point Protocol
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Internet mail access protocol
28. FQDN means...
Point-to-Point Protocol
raphical User Interface
Fully Qualified Domain Name
Time domain reflectometer
29. On what Port is SNMP?
Bayonet-Neill-Concelman or British Naval Connector
Token passing
Secure Sockets Layer
161 & 162
30. IP means...
It is an address assigned to a NIC (Network Interface Card).
Token passing
Internet Protocol
IMAP (Mail Client)
31. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point?
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
A. 18 -000 feet (5 -486.4 meters)
550 meters (1 -804.46 feet)
Bluetooth enabled cell phones
32. Workstations
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. AC means...
SUN RPC
802.11a.
Alternating Current
Peer-To-Peer and Client-Server
34. On a switched Ethernet network that is operating perfectly - what is the state in which a user will find the activity LED (Light Emitting Diode)?
Periodically (randomly) blinking
User Datagram Protocol
POP3
72.16.16.1
35. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
Periodically (randomly) blinking
SMB (Server Message Block)
Handles tasks in the place of other machines on the network
ICMP (Internet Control Message Protocol)
36. A valid MAC (Media Access Control) address is how many bytes long?
Wireless Protected Access
Service Set Identifier
6
Central Processing unit
37. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
DNS
169.254.1.1
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
23
38. What is on Port 23?
80
Telnet
IMAP (Mail Client)
Secure Shell
39. Describe a ring topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. PPP Means...
PDC (Primary Domain Controller)
BootP (Boot Protocol)
WINS (Windows Internet Name Service)
Point-to-Point Protocol
41. What is PAP?
HTTP
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Password Authentication Protocol
Primary Rate Interface
42. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
encapsulating the data payload.
Internet Control Message Protocol
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
43. Which one of the following options is a security standard for 802.11?
Point to Point Protocol
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
WEP (Wired Equivalent Privacy)
Fully Qualified Domain Name
44. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
rp
Extranet
Connect Workstation 6 and Workstation 2 using a barrel connector
Application
45. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
Verification
Multiple Link Interface
HTTPS/ SSL
The amber light is flashing occasionally and the green light is lit steadily.
46. MAC Means...
Media Access Control
Port Address Translator
Public Key Infrastructure
1000BASE-CX
47. Proxy Server
100 Mbps (Megabits per second)
Networked Basic Input/Output System Extended User Interface
Handles tasks in the place of other machines on the network
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
48. GUI means
raphical User Interface
Routing Internet Protocol
rlogin
Handles tasks in the place of other machines on the network
49. SSH Means...
Media Access Control
Secure Shell
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
135-139
50. ICMP means...
All hosts can communicate.
Media Access Control
Internet Control Message Protocol
Any network device with an IP address