SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is on Ports 161 and 162?
Exterior Gateway Protocol
Port 161 is SNMP and Port 162 is the SNMP Manager
rlogin
There will be no Internet access.
2. PPTP Means...
Point-to-Point Tunneling Protocol
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
The file has been opened by another user and is open for read only.
In the LAN (Local Area Network)
3. List the drawbacks of a star topology
TCP / IP (Transmission Control Protocol / Internet Protocol)
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Initial installation cost may be higher - One central single point of failure (the hub or other device)
The analyzer is functioning properly.
4. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?
A long length of antenna extension cable
TFTP (Trivial File Transfer Protocol)
Basic Input/Output System
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
5. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
In the LAN (Local Area Network)
169.254.1.1
Intrusion Detection System
110
6. What is EGP?
80
389
8080
Exterior Gateway Protocol
7. A star network that uses several cable types must use which hub type in order to accommodate all client machines?
Point to Point Tunneling Protocol
Port 161 is SNMP and Port 162 is the SNMP Manager
Hybrid hub
Connect Workstation 6 and Workstation 2 using a barrel connector
8. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
gateway.
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Sys Log (Unix) or Event Manager (Windows)
9. Name the seven most common physical topologies
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Point to Point Tunneling Protocol
10. Proxy Server
Handles tasks in the place of other machines on the network
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Global System for Mobile Communications
Bus
11. BRI Means...
Basic Rate Interface
DNS
Service Set Identifier
Internet Protocol
12. NFS Means...
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
1000BASE-LX and10 GBASE-LR
Network File System
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
13. TFTP Means...
Simple Network Management Protocol
netstat
Internet connection
Trivial File Transfer Protocol
14. Which of the following are classified as Layer 2 devices?
Packets from entering and leaving a network
Exterior Gateway Protocol
Routing Internet Protocol
Switches - bridges - and NICs (Network Interface Card)
15. What is on Port 389?
Intrusion Detection System
A striped set array with parity
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
16. 802.11 security is defined in...
WEP (Wired Equivalent Privacy)
Public Key Infrastructure
802.11i
Internet Control Message Protocol
17. Why did we develop networking?
User Datagram Protocol. This protocol is connectionless and routable.
MAC (Media Access Control) address
Network Interface Card
As a way to share resources and information
18. What is IP?
Internet Protocol
10 GBASE-LR
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
19. A network administrator adds a router to create a new subnet. Which of the following network services requires configuration to accommodate NetBIOS (Network Basic Input / Output System) on the new network?
1000BASE-LX and10 GBASE-LR
DNS (Domain Name Service) server settings
WINS (Windows Internet Name Service)
An exact duplicate of the infrastructure is mirrored offsite.
20. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
An eight-position connector which uses UTP (Unshielded Twisted Pair).
encapsulating the data payload.
ICMP (Internet Control Message Protocol)
SSH
21. List the drawbacks of a ring topology
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
DNS
SSH
Internet Protocol Security. This is the defacto standard for VPN security.
22. This is not an IP (Internet Protocol) addresses.
72.16.16.1
Port Address Translator
Intrusion Detection System
The amber light is flashing occasionally and the green light is lit steadily.
23. PRI Means...
SMB (Server Message Block)
Windows Internet Name Service
Handles tasks in the place of other machines on the network
Primary Rate Interface
24. What is on Ports 20 and 21?
RDP/ Terminal Services
Secure Shell
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Manages network applications
25. A user would like to implement a secure ordering system on a web server. Which of the following protocols is installed?
Application
100BASE-FX Answer: D
SSL (Secure Sockets Layer)
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
26. On what Port is the Proxy Server?
netstat
8080
23
SMB (Server Message Block)
27. NAT Means...
Network Address Translation
1000BASE-CX
Point-to-Point Protocol
Industry Standards Organization
28. On what Port is TFTP?
A striped set array with parity
Proxy
69
802.11a.
29. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
The device ID (Identification)
10
53
ifconfig
30. On what Port is NetBios?
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
135-139
TFTP (Trivial File Transfer Protocol)
10 GBASE-LR
31. RIP Means...
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Routing Information Protocol
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
larger subnet masks.
32. NNTP Means...
Internet Protocol Security
User Datagram Protocol
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Network News Transfer Protocol
33. Which one of the following security protocols creates a secure connection over the Internet?
Application
L2TP (Layer 2 Tunneling Protocol)
Point to Point Tunneling Protocol
802.11a.
34. On what Port is DNS?
53
TFTP (Trivial File Transfer Protocol)
48 bits.
As a way to share resources and information
35. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
Internetwork Packet Exchange/Sequenced Packet Exchange
Put a router between the two network segments
Port 161 is SNMP and Port 162 is the SNMP Manager
CSU / DSU (Channel Service Unit / Data Service Unit)
36. Which one of the following is a purpose for subnetting?
To decrease network congestion Answer: D
rlogin
Exterior Gateway Protocol
MT-RJ (Mechanical Transfer-Registered Jack)
37. On what Port is HTTPS/ SSL?
10 GBASE-LR
Presentation
443
1000BASE-LX and10 GBASE-LR
38. GSM means...
Global System for Mobile Communications
An old microwave oven is being used in the break room which causes interference with the access point.
Connect Workstation 6 and Workstation 2 using a barrel connector
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
39. What is on Port 110?
WEP (Wired Equivalent Privacy)
SMB (Server Message Block)
POP3
larger subnet masks.
40. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
Presentation
cold site.
Public Switched Telephone Network
The device ID (Identification)
41. What is on Port 3389?
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
RDP/ Terminal Services
All workstations except Workstation 3 can communicate to each other.
Port Address Translator
42. Examples of valid WEP (Wired Equivalent Privacy) key lengths
DNS (Domain Name Service) server settings
PPTP (Point-to-Point Tunneling Protocol)
40 bit - 128 bit - 64 bit
Select the most probable cause
43. This is not a valid IP (Internet Protocol) addresses
A 2.4 GHz (Gigahertz) cordless telephone is in use.
WEP (Wired Equivalent Privacy)
Peer-To-Peer and Client-Server
172.192.4.256
44. What is on Port 53?
WEP (Wired Equivalent Privacy)
DNS
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
gateway.
45. EMI means...
Bluetooth enabled cell phones
Proxy server
Electromagnetic Interference
The 'memo maker' that sends and receives paperless faxes over the network
46. HTTPS means...
Public Key Infrastructure
3389
File Transfer Protocol
Hypertext transfer protocol over secure sockets layer.
47. What is IPSEC? Why is it significant?
Internet Protocol Security. This is the defacto standard for VPN security.
389
Metropolitan Area Network
Open Source Path First - this is a routing protocol
48. What is Unicast?
the NIC (Network Interface Card) is bad.
Public Key Infrastructure
SMTP Server
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
49. BNC Means...
Network and Transport
53
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Bayonet-Neill-Concelman or British Naval Connector
50. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
SMTP Server
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
The 'memo maker' that sends and receives paperless faxes over the network
2.4 GHz (Gigahertz).
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests