SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
Proxy
Internet mail access protocol
2. A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning correctly and the network is up - which of the following will
Dynamic Host Configuration Protocol
ICMP (Internet Control Message Protocol)
172.192.4.256
The amber light is flashing occasionally and the green light is lit steadily.
3. What is EGP?
An exact duplicate of the infrastructure is mirrored offsite.
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Exterior Gateway Protocol
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
4. DC means...
ICMP (Internet Control Message Protocol)
Manages printers on the network
Direct Current
Network and Transport
5. What is on Ports 135-139?
Handles tasks in the place of other machines on the network
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
NetBios
A 2.4 GHz (Gigahertz) cordless telephone is in use.
6. Which of the following options allows for secure communication over the Internet?
Intrusion Detection System
The 'memo maker' that sends and receives paperless faxes over the network
User Datagram Protocol
VPN (Virtual Private Network)
7. Remote Access Server
10 GBASE-LR
Provides remote users with access to the network through modems and an IP connection
An eight-position connector which uses UTP (Unshielded Twisted Pair).
A long length of antenna extension cable
8. BIOS Means...
Quality of Service
Wireless Protected Access
Stores and dispenses files
Basic Input/Output System
9. Which protocol does a diskless workstation use to obtain a network address?
Windows Internet Name Service
rp
135-139
BootP (Boot Protocol)
10. An administrator changes the lease time of the DHCP (Dynamic Host Configuration Protocol) scope from one week to one day. What affect will this have on the end users?
Verification
gateway.
3.1
The users will not be affected by the change.
11. What is on Port 25?
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Provides remote users with access to the network through modems and an IP connection
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
SMTP Server
12. Disk mirroring is also known as RAID ___...
Internet Protocol
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
1
Plain Old Telephone Service
13. Examples of valid WEP (Wired Equivalent Privacy) key lengths
Password Authentication Protocol
Quality of Service
User Datagram Protocol. This protocol is connectionless and routable.
40 bit - 128 bit - 64 bit
14. Fault Tolerance
Internet Protocol
Address Resolution Protocol. Has no error control.
Manages printers on the network
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
15. A network technician is troubleshooting a remote home users computer that is behind a SOHO (Small Office / Home Office) router running NAT (Network Address Translation). The technician wants to ping the IP (Internet Protocol) address of the remote us
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
To decrease network congestion Answer: D
111
This IP (Internet Protocol) address cannot be pinged remotely.
16. NAT Means...
Network Address Translation
DNS (Domain Name Service) server settings
rp
PPP (Point-to-Point Protocol)
17. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link layer?
Network Time Protocol
Network Address Translator
netstat
802.2
18. What is PAT?
Port Address Translator
Connect Workstation 6 and Workstation 2 using a barrel connector
Routing Information Protocol
Hypertext transfer protocol
19. Proxy Server
POP3
Application
Handles tasks in the place of other machines on the network
ICMP (Internet Control Message Protocol)
20. Name the seven most common physical topologies
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Internetwork Packet Exchange/Sequenced Packet Exchange
Any network device with an IP address
514
21. PRI Means...
Basic Input/Output System
Primary Rate Interface
VPN (Virtual Private Network)
passing a username and password in plaintext.
22. POP Means...
Post Office Protocol
Institute of Electrical and Electronics Engineers
Proxy Server
A network map showing exactly how data moves through the network.
23. ISO Means...
Industry Standards Organization
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Verification
Direct Current
24. Six workstations that are numbered 1-6 are installed sequentially in a physical ring topology. Workstation 1 fails. How can the network administrator remove Workstation 1 for service without moving the other workstations?
rp
Fully Qualified Domain Name
Easy to install - Inexpensive - Less actual cable required
Connect Workstation 6 and Workstation 2 using a barrel connector
25. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolve
Select the most probable cause
DNS (Domain Name Service) server settings
Network News Transfer Protocol
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
27. Which UNIX service provides interoperability with Windows file and print sharing?
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Global System for Mobile Communications
SMB (Server Message Block)
111
28. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
25
SUN RPC
This IP (Internet Protocol) address cannot be pinged remotely.
L2TP (Layer 2 Tunneling Protocol)
29. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
Network and Transport
SQL Server
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Internet Protocol Security. This is the defacto standard for VPN security.
30. A small company connected to the Internet through a SOHO (Small Office / Home Office) router wants to make an internal web server public on the Internet. Computers on the LAN can access the web pages but Internet users cannot. What should be done to
encapsulating the data payload.
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Bridge
31. Which one of the following provides a fault-tolerant storage system containing five disks and a single controller that will function if a single disk fails?
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
A striped set array with parity
CSU / DSU (Channel Service Unit / Data Service Unit)
802.11i
32. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point?
Hypertext transfer protocol over secure sockets layer.
Network Interface Card
802.11
Bluetooth enabled cell phones
33. PKI means...
Networked Basic Input/Output System
Reverse Address Resolution Protocol.
Public Key Infrastructure
Connect Workstation 6 and Workstation 2 using a barrel connector
34. ACL means...
Access Control List
ICMP (Internet Control Message Protocol)
40 bit - 128 bit - 64 bit
DNS (Domain Name Service) server settings
35. Upon which devices can NAT (Network Address Translation) be used?
passing a username and password in plaintext.
1433
Firewall
Bus
36. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has the shortest maximum distance?
DNS
IMAP (Mail Client)
1000BASE-CX
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
37. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
D. Switch and bridge
Point-to-Point Tunneling Protocol
SMB (Server Message Block)
Application
38. Logical Topology
A network map showing exactly how data moves through the network.
An exact duplicate of the infrastructure is mirrored offsite.
Public Key Infrastructure
Check the connection from the WAP (Wireless Access Point) to the network
39. Mail Server
Public Switched Telephone Network
Handles e-mail functions
Proxy
Application
40. What is on Port 22?
Port 161 is SNMP and Port 162 is the SNMP Manager
SSH
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Transmission Control Protocol
41. What is RIP?
Routing Internet Protocol
Reverse Address Resolution Protocol.
Manages printers on the network
10
42. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
Internet Information Services
CSU / DSU (Channel Service Unit / Data Service Unit)
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
10
43. What is Broadcast Transmission?
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
The amber light is flashing occasionally and the green light is lit steadily.
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
All workstations except Workstation 3 can communicate to each other.
44. Fax Server
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. URL Means...
Point to Point Protocol
Uniform Resource Locator
MAC (Media Access Control) address
POP3
46. Which of the following choices describes an RJ-45 (Registered Jack) connector?
All hosts can communicate.
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
netstat and ping
An eight-position connector which uses UTP (Unshielded Twisted Pair).
47. FQDN means...
Password Authentication Protocol
SMB (Server Message Block)
Fully Qualified Domain Name
Public Switched Telephone Network
48. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
ICMP (Internet Control Message Protocol)
Port 20 must also be unblocked.
Network and Transport
BootP (Boot Protocol)
49. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
gateway.
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
the NIC (Network Interface Card) is bad.
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
50. Which command generated the following output? Active Connections Proto Local Address Foreign Address State TCP CompA:3006 192.168.0.2:Microsoft Established TCP CompA:3021 192.168.0.246:HTTP Established
Simple Network Management Protocol
SMTP Server
nslookup
netstat