SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is QoS?
PDC (Primary Domain Controller)
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
WINS (Windows Internet Name Service)
Quality of Service
2. EMI means...
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
Electromagnetic Interference
L2TP (Layer 2 Tunneling Protocol)
The analyzer is functioning properly.
3. Logical Topology
A network map showing exactly how data moves through the network.
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
In a locked room in an offsite location
4. An administrator changes the lease time of the DHCP (Dynamic Host Configuration Protocol) scope from one week to one day. What affect will this have on the end users?
Light Emitting Diode
The users will not be affected by the change.
Institute of Electrical and Electronics Engineers
The device ID (Identification)
5. Which of the following connectors will be required for a RAS (Remote Access Service) server accepting four incoming dial-up connections to connect to the PSTN (Public Switched Telephone Network)?
Port Address Translator
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
RJ-11 (Registered Jack)
Point-to-Point Tunneling Protocol
6. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by...
Hypertext Markup Language
rp
passing a username and password in plaintext.
RDP/ Terminal Services
7. Why did we develop networking?
Check the connection from the WAP (Wireless Access Point) to the network
Public Switched Telephone Network
As a way to share resources and information
Internet Protocol Security
8. TDR means...
Hypertext transfer protocol
Quality of Service
Remote Desktop Protocol
Time domain reflectometer
9. What is on Port 53?
DNS
Provides remote users with access to the network through modems and an IP connection
Server Message Block OR Small-to-Midsize Business
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
10. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
A network map showing exactly how data moves through the network.
The users will not be affected by the change.
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
encapsulating the data payload.
11. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
Physical
Point to Point Tunneling Protocol
SSH
Application
12. What is on Port 143?
Data Link
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
IMAP (Mail Client)
22
13. A small office network with ten computers uses a cable modem and router to connect to the Internet and distribute services to clients. After several weeks of use - the routers collision LED (Light Emitting Diode) has begun to stay on permanently. Wha
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
20 & 21
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
14. Print Server
8080
Manages printers on the network
Lightweight Directory Access Protocol
Extranet
15. Fault Tolerance
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
Transmission Control Protocol/Internet Protocol
Manages printers on the network
Dynamic Host Configuration Protocol
16. Which dial-up protocol is capable of passing multiple LAN (Local Area Network) protocols across the wire?
10 GBASE-LR
53
An eight-position connector which uses UTP (Unshielded Twisted Pair).
PPP (Point-to-Point Protocol)
17. Which one of the following security protocols creates a secure connection over the Internet?
L2TP (Layer 2 Tunneling Protocol)
NFS (Network File System)
Open Source Path First - this is a routing protocol
Dynamic Host Configuration Protocol
18. All of the following options transmit data over a modem EXCEPT...
T1 (T-Carrier Level 1).
Point-to-Point Protocol
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
In a locked room in an offsite location
19. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
Two or more connected computers that can share resources
Lightweight Directory Access Protocol
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
An exact duplicate of the infrastructure is mirrored offsite.
20. DC means...
1433
Direct Current
ifconfig
Industry Standards Organization
21. ISO Means...
Industry Standards Organization
Media Access Control
802.11a.
Network Access Control
22. What is on Port 389?
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
DNS (Domain Name Service) server settings
Internet Protocol Security
NetBios
23. On what Port is the SMTP Server?
Wireless Access Point
25
10 GBASE-LR
Switches - bridges - and NICs (Network Interface Card)
24. MAC Means...
Media Access Control
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
Internet Service Provider
cold site.
25. TCP/IP Means;
Network Interface Card
Transmission Control Protocol
Transmission Control Protocol/Internet Protocol
Handles e-mail functions
26. What is NAT?
48 bits.
1000BASE-LX and10 GBASE-LR
Client - protocol - and adapter
Network Address Translator
27. A network administrator is troubleshooting connectivity from a client machine. An error message that reads 'Page Cannot be Displayed' is shown in the browser whenever a FQDN (Fully Qualified Domain Name) is typed in the address bar. However - if the
Internetwork packet exchange
User Datagram Protocol. This protocol is connectionless and routable.
SSL (Secure Sockets Layer)
53
28. WINS Means...
Provides remote users with access to the network through modems and an IP connection
Proxy
Windows Internet Name Service
1000BASE-CX
29. PKI means...
Public Key Infrastructure
25
Network Address Translation
Physical
30. On what Port is HTTP?
RJ-11 (Registered Jack)
72.16.16.1
80
rlogin
31. A user would like to implement a secure ordering system on a web server. Which of the following protocols is installed?
SSL (Secure Sockets Layer)
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Point to Point Protocol
Trivial File Transfer Protocol
32. WEP Means...
Multiple Link Interface
1000BASE-LX and10 GBASE-LR
Wired Equivalent Privacy
SQL Server
33. On what Port is TFTP?
69
L2TP (Layer 2 Tunneling Protocol)
Extranet
Data Link
34. Disk mirroring is also known as RAID ___...
Global Positioning System
ping
40 bit - 128 bit - 64 bit
1
35. A network administrator notices in his secure wireless office that many of his wireless client machines constantly lose network connectivity. The wired clients never have downtime. Theadministrator also notices that the wireless clients all lose conn
Check the connection from the WAP (Wireless Access Point) to the network
Disk Operating System or Denial of Service
Packets from entering and leaving a network
1000BASE-CX
36. What is Broadcast Transmission?
Server Message Block OR Small-to-Midsize Business
Extranet
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Post Office Protocol
37. In which OSI (Open Systems Interconnect) layer does a bridge operate?
Put a router between the two network segments
Data Link
DNS (Domain Name Service) server settings
Digital Subscriber Line
38. On what Port is Telnet?
The device ID (Identification)
23
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Provides remote users with access to the network through modems and an IP connection
39. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point?
Disk Operating System or Denial of Service
Bluetooth enabled cell phones
Trivial File Transfer Protocol
Internet Service Provider
40. This is not an IP (Internet Protocol) addresses.
80
72.16.16.1
Address Resolution Protocol. Has no error control.
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
41. What is OSPF?
Open Source Path First - this is a routing protocol
Network Access Control
It is an address assigned to a NIC (Network Interface Card).
802.2
42. Which protocol is the fastest file transfer protocol?
TFTP (Trivial File Transfer Protocol)
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Alternating Current
69
43. NNTP Means...
Exterior Gateway Protocol
IMAP (Mail Client)
POP3
Network News Transfer Protocol
44. Which one of the following options is a security standard for 802.11?
WEP (Wired Equivalent Privacy)
48 bits.
Internetwork Packet Exchange/Sequenced Packet Exchange
10
45. BIOS Means...
MultiProtocol Label Switching
Put a router between the two network segments
Basic Input/Output System
Post Office Protocol 3
46. MLI Means...
Wireless Access Point
Application
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Multiple Link Interface
47. On what Port is SNMP?
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Switches - bridges - and NICs (Network Interface Card)
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
161 & 162
48. Mail Server
Handles e-mail functions
A long length of antenna extension cable
It is an address assigned to a NIC (Network Interface Card).
Internet Control Message Protocol
49. Network
Reverse Address Resolution Protocol.
Trivial File Transfer Protocol
Disk Operating System or Denial of Service
Two or more connected computers that can share resources
50. Which one of the following communication protocols does a UNIX system primarily rely on?
Hypertext transfer protocol over secure sockets layer.
Challenge Handshake Authentication Protocol
TCP / IP (Transmission Control Protocol / Internet Protocol)
100BASE-FX Answer: D