SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is Multicast Transmission?
A. 18 -000 feet (5 -486.4 meters)
ifconfig
48 bits.
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
2. DC means...
Direct Current
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
72.16.16.1
An exact duplicate of the infrastructure is mirrored offsite.
3. TDR means...
Time domain reflectometer
Internet Protocol Security. This is the defacto standard for VPN security.
VPN (Virtual Private Network)
100BASE-FX Answer: D
4. Which protocol is used for error reporting in concert with the IP protocol?
traceroute
In a locked room in an offsite location
ICMP (Internet Control Message Protocol)
802.11i
5. What is on Port 53?
MT-RJ (Mechanical Transfer-Registered Jack)
Disk Operating System or Denial of Service
Client - protocol - and adapter
DNS
6. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
RJ-11 (Registered Jack)
User Datagram Protocol. This protocol is connectionless and routable.
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
7. A user has set up filtering on an Internet router. The local SMTP (Simple Mail Transfer Protocol) server has stopped sending or receiving messages from the Internet. What is the cause of the problem?
The Internet router is blocking port 25.
ICMP (Internet Control Message Protocol)
Transmission Control Protocol
Network File System
8. A network administrator is troubleshooting connectivity from a client machine. An error message that reads 'Page Cannot be Displayed' is shown in the browser whenever a FQDN (Fully Qualified Domain Name) is typed in the address bar. However - if the
Metropolitan Area Network
53
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
L2TP (Layer 2 Tunneling Protocol)
9. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
10 GBASE-LR
Application
passing a username and password in plaintext.
Public Key Infrastructure
10. What is on Port 22?
netstat
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
SSH
Wireless Access Point
11. WEP Means...
Wired Equivalent Privacy
Multiple Link Interface
Local Area Network
Reverse Address Resolution Protocol.
12. What is on Port 1433?
Internet Protocol Security
PDC (Primary Domain Controller)
SQL Server
WEP (Wired Equivalent Privacy)
13. DHCP means...
Domain Name Service OR Domain Name Server
111
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Dynamic Host Configuration Protocol
14. A WINS (Windows Internet Name Service) network administrator has disabled DNS (Domain Name Service) for security reasons. Users have lost the ability to access remote network shares named ournetworkshares and ourprivateshares. How can this be resolve
HTTPS/ SSL
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Forward the packets to all ports except the one that originated the request
15. FTP Means
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Network Address Translation
File Transfer Protocol
Industry Standards Organization
16. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
netstat
The device ID (Identification)
6
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
17. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)?
802.11
802.11a.
User Datagram Protocol
Bayonet-Neill-Concelman or British Naval Connector
18. TCP means...
Transmission Control Protocol/Internet Protocol
6
Transmission Control Protocol
File Transfer Protocol
19. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?
RDP/ Terminal Services
Transmission Control Protocol
Easy to install - Inexpensive - Less actual cable required
A long length of antenna extension cable
20. What is ARP? What are some of its attributes?
Address Resolution Protocol. Has no error control.
An eight-position connector which uses UTP (Unshielded Twisted Pair).
An old microwave oven is being used in the break room which causes interference with the access point.
1000BASE-LX and10 GBASE-LR
21. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Wireless Access Point
An exact duplicate of the infrastructure is mirrored offsite.
These are the FTP ports. Port 20 handles data and Port 21 provides control.
22. HTTP Means...
1000BASE-LX and10 GBASE-LR
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Hypertext transfer protocol
Point to Point Tunneling Protocol
23. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
550 meters (1 -804.46 feet)
Networked Basic Input/Output System Extended User Interface
Quality of Service
Point to Point Protocol
24. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. What is CHAP?
3.1
80
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Challenge Handshake Authentication Protocol
26. A network has grown to include seventy 24 port Ethernet switches and has decreased in performance steadily as new switches are added. What adjustments can be made to the infrastructure to improve the performance?
1433
Implement VLANs (Virtual Local Area Network)
Network and Transport
Packets from entering and leaving a network
27. Which one of the following servers provides web caching services?
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Proxy
CSU / DSU (Channel Service Unit / Data Service Unit)
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
28. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
802.1x
172.192.4.256
PPTP (Point-to-Point Tunneling Protocol)
29. POP Means...
SSL (Secure Sockets Layer)
Firewall
larger subnet masks.
Post Office Protocol
30. Telephony Server
POP3
Integrated Services digital Network
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
31. GSM means...
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Two or more connected computers that can share resources
Global System for Mobile Communications
Windows Internet Name Service
32. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
Periodically (randomly) blinking
Intrusion Detection System
rlogin
encapsulating the data payload.
33. List the drawbacks of a ring topology
CSU / DSU (Channel Service Unit / Data Service Unit)
A long length of antenna extension cable
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
IMAP (Mail Client)
34. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. Which one of the following provides a fault-tolerant storage system containing five disks and a single controller that will function if a single disk fails?
Wireless LAN
Gateway
Transmission Control Protocol
A striped set array with parity
36. On what Port is the SMTP Server?
Point to Point Protocol
1
Internet Service Provider
25
37. ACL means...
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Access Control List
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
8080
38. Which of the following is used to translate NetBIOS (Network Basic Input / Output System) names
Networked Basic Input/Output System
Network and Transport
NetBios
WINS (Windows Internet Name Service)
39. NTP means...
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Network Time Protocol
Point-to-Point Protocol
Transmission Control Protocol
40. To increase the number of available IP (Internet Protocol) addresses - IPv6 (Internet Protocol version 6) uses which one of the following options?
Proxy server
Challenge Handshake Authentication Protocol
A long length of antenna extension cable
128 bit addresses
41. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
TFTP (Trivial File Transfer Protocol)
192.168.96.254
Port 20 must also be unblocked.
ping
42. How are physical and logical topologies different?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. POP3 Means...
100BASE-FX Answer: D
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
802.11i
Post Office Protocol 3
44. What is a MAC (Media Access Control) address?
It is an address assigned to a NIC (Network Interface Card).
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
There will be no Internet access.
Server Message Block OR Small-to-Midsize Business
45. ISP Means...
Internet Service Provider
Network Access Control
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
User Datagram Protocol. This protocol is connectionless and routable.
46. MIME means...
Provides remote users with access to the network through modems and an IP connection
1433
Multipurpose Internet Mail Extension
Internet connection
47. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
169.254.1.1
802.11i
DNS
48. Which of the following are classified as Layer 2 devices?
Switches - bridges - and NICs (Network Interface Card)
Industry Standards Organization
100 Mbps (Megabits per second)
6
49. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
A 2.4 GHz (Gigahertz) cordless telephone is in use.
larger subnet masks.
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
As a way to share resources and information
50. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
Exterior Gateway Protocol
25
Application
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance