SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WINS Means...
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Asynchronous Transfer Mode
Windows Internet Name Service
2. NNTP Means...
Internet Protocol Security. This is the defacto standard for VPN security.
netstat and ping
Internet Information Services
Network News Transfer Protocol
3. Which IEEE (Institute of Electrical and Electronics Engineers) 802.x standard defines the operation of the LLC (Logical Link Control) sublayer of the OSI (Open Systems Interconnect) models Data Link layer?
Lightweight Directory Access Protocol
802.2
Provides remote users with access to the network through modems and an IP connection
Internet mail access protocol
4. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
Networked Basic Input/Output System Extended User Interface
550 meters (1 -804.46 feet)
All hosts can communicate.
The amber light is flashing occasionally and the green light is lit steadily.
5. What is DHCP? What is its key attribute?
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
802.11a.
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
6. What is Multicast Transmission?
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Internet Protocol
135-139
7. ATM Means...
Physical
10 GBASE-LR
The file has been opened by another user and is open for read only.
Asynchronous Transfer Mode
8. On what Port is LDAP?
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
389
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
9. This is not an IP (Internet Protocol) addresses.
Check the connection from the WAP (Wireless Access Point) to the network
ICMP (Internet Control Message Protocol)
RJ-11 (Registered Jack)
72.16.16.1
10. A small office network with ten computers uses a cable modem and router to connect to the Internet and distribute services to clients. After several weeks of use - the routers collision LED (Light Emitting Diode) has begun to stay on permanently. Wha
Service Set Identifier
Wireless Protected Access
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
69
11. Network
Two or more connected computers that can share resources
Internet Protocol Security
ping
Network File System
12. Client-Server Networks
A long length of antenna extension cable
Electromagnetic Interference
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Check the connection from the WAP (Wireless Access Point) to the network
13. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point?
Internet Service Provider
Token passing
Bluetooth enabled cell phones
TFTP (Trivial File Transfer Protocol)
14. On what Port is NetBios?
1000BASE-CX
Network and Transport
514
135-139
15. A valid MAC (Media Access Control) address is how many bytes long?
6
rp
IMAP (Mail Client)
Public Key Infrastructure
16. POP3 Means...
The amber light is flashing occasionally and the green light is lit steadily.
Transmission Control Protocol
Post Office Protocol 3
Authentication
17. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
This IP (Internet Protocol) address cannot be pinged remotely.
netstat
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
18. A user is trying to access a FTP (File Transfer Protocol) server but discovers that FTP (File Transfer Protocol) is being blocked by a firewall. After unblocking port 21 on the firewall - FTP (File Transfer Protocol) still does not work. What is the
Port 20 must also be unblocked.
Network Access Control
traceroute
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
19. AC means...
143
Alternating Current
Proxy server
2
20. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
10
It is an address assigned to a NIC (Network Interface Card).
21. Which fiber connector looks similar to an RJ-45 (Registered Jack) connector and connects two strands of fiber?
550 meters (1 -804.46 feet)
MT-RJ (Mechanical Transfer-Registered Jack)
Gateway
Any network device with an IP address
22. On what Port is the Proxy Server?
NetBios
These are the FTP ports. Port 20 handles data and Port 21 provides control.
128 bit addresses
8080
23. If a destination address is not in a bridges forwarding table - what will the bridge do?
D. Switch and bridge
SSH
Domain Name Service OR Domain Name Server
Forward the packets to all ports except the one that originated the request
24. Which media access method is used for an IEEE (Institute of Electrical and Electronics Engineers) 802.5 network?
The device ID (Identification)
Token passing
Client - protocol - and adapter
Institute of Electrical and Electronics Engineers
25. Workstations
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
26. What is LEAP?
User Datagram Protocol. This protocol is connectionless and routable.
Exterior Gateway Protocol
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
27. ISO Means...
Integrated Services digital Network
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Industry Standards Organization
28. On what Port is DNS?
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
53
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
29. What is CHAP?
Challenge Handshake Authentication Protocol
Periodically (randomly) blinking
2
Internet Information Services
30. Host
Point to Point Tunneling Protocol
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
Bridge
Any network device with an IP address
31. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
ICMP (Internet Control Message Protocol)
Hypertext transfer protocol
New Technology File System
802.11
32. A network administrator adds a router to create a new subnet. Which of the following network services requires configuration to accommodate NetBIOS (Network Basic Input / Output System) on the new network?
WINS (Windows Internet Name Service)
DNS (Domain Name Service) server settings
SQL Server
143
33. What is PPP?
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
PPTP (Point-to-Point Tunneling Protocol)
Point to Point Protocol
22
34. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Basic Input/Output System
802.1x
A. 18 -000 feet (5 -486.4 meters)
35. List the benefits of a bus topology
Password Authentication Protocol
25
Easy to install - Inexpensive - Less actual cable required
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
36. Which command generated the following output? Active Connections Proto Local Address Foreign Address State TCP CompA:3006 192.168.0.2:Microsoft Established TCP CompA:3021 192.168.0.246:HTTP Established
ICMP (Internet Control Message Protocol)
Access Control List
Application
netstat
37. NTP means...
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
Proxy Server
Wireless Protected Access
Network Time Protocol
38. What is on Port 69?
The Internet router is blocking port 25.
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
TFTP (Trivial File Transfer Protocol)
Network Time Protocol
39. Mail Server
Handles e-mail functions
72.16.16.1
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
443
40. What is EGP?
1000BASE-LX and10 GBASE-LR
Internet connection
Exterior Gateway Protocol
All hosts can communicate.
41. GSM means...
Implement VLANs (Virtual Local Area Network)
135-139
Internet Protocol
Global System for Mobile Communications
42. On what Port is HTTPS/ SSL?
Hypertext transfer protocol over secure sockets layer.
443
rlogin
Routing Information Protocol
43. Which one of the following communication protocols does a UNIX system primarily rely on?
Internet Information Services
TCP / IP (Transmission Control Protocol / Internet Protocol)
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Network File System
44. Why did we develop networking?
SSL (Secure Sockets Layer)
As a way to share resources and information
Networked Basic Input/Output System
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
45. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
802.1x
3389
MAC (Media Access Control) address
46. RADIUS (Remote Authentication Dial-In User Service) provides which functionality for remote access?
Authentication
3.1
514
Verification
47. NFS Means...
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
In a locked room in an offsite location
New Technology File System
Network File System
48. Application Server
SMTP Server
TCP / IP (Transmission Control Protocol / Internet Protocol)
53
Manages network applications
49. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by...
passing a username and password in plaintext.
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
rlogin
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
50. An Ethernet MAC (Media Access Control) address consists of...
Internet Protocol Security. This is the defacto standard for VPN security.
48 bits.
In the LAN (Local Area Network)
Point to Point Protocol