SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. UDP Means...
User Datagram Protocol
As a way to share resources and information
POP3
Proxy Server
2. A network administrator adds a router to create a new subnet. Which of the following network services requires configuration to accommodate NetBIOS (Network Basic Input / Output System) on the new network?
POP3
Wireless Access Point
WINS (Windows Internet Name Service)
RDP/ Terminal Services
3. PAP (Password Authentication Protocol) secures PPP (Point-to-Point Protocol) sessions by...
passing a username and password in plaintext.
TCP / IP (Transmission Control Protocol / Internet Protocol)
Point-to-Point Protocol
SSL (Secure Sockets Layer)
4. MPLS
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
These are the FTP ports. Port 20 handles data and Port 21 provides control.
135-139
MultiProtocol Label Switching
5. IDS means...
All workstations except Workstation 3 can communicate to each other.
Intrusion Detection System
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
ICMP (Internet Control Message Protocol)
6. On what Port is IMAP?
143
bytes 1-3
New Technology File System
Wireless Fidelity
7. Which one of the following security protocols creates a secure connection over the Internet?
L2TP (Layer 2 Tunneling Protocol)
Internet Control Message Protocol
128 bit addresses
A transmission method in which data is transferred from a specific source address to a specific destination address. (Network nodes not involved in the transfer ignor the transmission.)
8. SSID Means...
Integrated Services digital Network
Service Set Identifier
CSU / DSU (Channel Service Unit / Data Service Unit)
802.2
9. TFTP Means...
User Datagram Protocol. This protocol is connectionless and routable.
Trivial File Transfer Protocol
Uniform Resource Locator
The analyzer is functioning properly.
10. What is Multicast Transmission?
22
VPN (Virtual Private Network)
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
802.11b
11. ICMP means...
The 'memo maker' that sends and receives paperless faxes over the network
Internet Control Message Protocol
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Transmission Control Protocol
12. Mail Server
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Handles e-mail functions
Network News Transfer Protocol
550 meters (1 -804.46 feet)
13. What is L2TP? What is significant about this protocol?
550 meters (1 -804.46 feet)
An exact duplicate of the infrastructure is mirrored offsite.
Wireless LAN
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
14. Which one of the following devices connects a network segment to a public telephone network?
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
CSU / DSU (Channel Service Unit / Data Service Unit)
passing a username and password in plaintext.
As a way to share resources and information
15. What is on Ports 20 and 21?
The users will not be affected by the change.
Quality of Service
These are the FTP ports. Port 20 handles data and Port 21 provides control.
Forward the packets to all ports except the one that originated the request
16. GSM means...
Domain Name Service OR Domain Name Server
Global System for Mobile Communications
A striped set array with parity
Internetwork packet exchange
17. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
Internet Control Message Protocol
TFTP (Trivial File Transfer Protocol)
Extranet
WINS (Windows Internet Name Service)
18. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
netstat and ping
19. NetBEUI Means...
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
Networked Basic Input/Output System Extended User Interface
Light Emitting Diode
Address Resolution Protocol. Has no error control.
20. On what Port is SQL Server?
1433
Provides remote users with access to the network through modems and an IP connection
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
Industry Standards Organization
21. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards has a longer maximum distance than 100 meters (328 feet)?
Point to Point Tunneling Protocol
100BASE-FX Answer: D
HTTPS/ SSL
25
22. FQDN means...
53
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Fully Qualified Domain Name
1
23. EMI means...
Electromagnetic Interference
Internet connection
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Media Access Control
24. WINS Means...
Sys Log (Unix) or Event Manager (Windows)
Windows Internet Name Service
POP3
Password Authentication Protocol
25. A facility designed to receive computer equipment during a disaster recovery is known as a...
Port 161 is SNMP and Port 162 is the SNMP Manager
25
cold site.
192.168.96.254
26. A network administrator is troubleshooting connectivity from a client machine. An error message that reads 'Page Cannot be Displayed' is shown in the browser whenever a FQDN (Fully Qualified Domain Name) is typed in the address bar. However - if the
The device ID (Identification)
User Datagram Protocol. This protocol is connectionless and routable.
53
Bus
27. Remote Access Server
1
The Internet router is blocking port 25.
Internet Control Message Protocol
Provides remote users with access to the network through modems and an IP connection
28. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
Application
10 GBASE-LR
53
Point-to-Point Tunneling Protocol
29. A small office network with ten computers uses a cable modem and router to connect to the Internet and distribute services to clients. After several weeks of use - the routers collision LED (Light Emitting Diode) has begun to stay on permanently. Wha
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
802.11a.
Network Address Translator
23
30. Which one of the following choices is the MOST secure place to store tape backups?
Put a router between the two network segments
Network Interface Card
The 'memo maker' that sends and receives paperless faxes over the network
In a locked room in an offsite location
31. On a switched Ethernet network that is operating perfectly - what is the state in which a user will find the activity LED (Light Emitting Diode)?
Wireless LAN
172.192.4.256
Switches - bridges - and NICs (Network Interface Card)
Periodically (randomly) blinking
32. What is CHAP?
Challenge Handshake Authentication Protocol
802.11b
Media Access Unit - Media attachment Unit
DNS
33. Which of the following options allows for secure communication over the Internet?
802.11
VPN (Virtual Private Network)
Bayonet-Neill-Concelman or British Naval Connector
Fully Qualified Domain Name
34. DNS means...
Token passing
An old microwave oven is being used in the break room which causes interference with the access point.
Bayonet-Neill-Concelman or British Naval Connector
Domain Name Service OR Domain Name Server
35. Network
135-139
Two or more connected computers that can share resources
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Bridge
36. What is on Port 23?
Telnet
Electromagnetic Interference
Hypertext transfer protocol over secure sockets layer.
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
37. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
A striped set array with parity
ICMP (Internet Control Message Protocol)
Internet connection
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
38. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
The file has been opened by another user and is open for read only.
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Internetwork Packet Exchange/Sequenced Packet Exchange
Basic Input/Output System
39. POP3 Means...
Proxy
Post Office Protocol 3
Open Source Path First - this is a routing protocol
D. Switch and bridge
40. This is not a valid IP (Internet Protocol) addresses
172.192.4.256
Internet mail access protocol
Network News Transfer Protocol
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
41. WLAN Means...
Wireless Access Point
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Wireless LAN
The amber light is flashing occasionally and the green light is lit steadily.
42. What is on Port 110?
POP3
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Basic Rate Interface
43. PSTN Means...
Primary Rate Interface
Dynamic Host Configuration Protocol - a network service that assigns IP addresses to clients. Should remember that it uses scopes to manage any excluded/ static IP addresses.
Sys Log (Unix) or Event Manager (Windows)
Public Switched Telephone Network
44. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Basic Input/Output System
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Telnet
45. What are the two main network types?
Industry Standards Organization
25
Peer-To-Peer and Client-Server
raphical User Interface
46. A user has set up filtering on an Internet router. The local SMTP (Simple Mail Transfer Protocol) server has stopped sending or receiving messages from the Internet. What is the cause of the problem?
Network News Transfer Protocol
Global System for Mobile Communications
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
The Internet router is blocking port 25.
47. A client workstation can authenticate user names and passwords to which type of server?
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Time domain reflectometer
PDC (Primary Domain Controller)
SUN RPC
48. NTFS Means...
POP3
New Technology File System
2
25
49. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses CSMA / CA (Carrier Sense Multiple Access / Collision Avoidance)?
802.11
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Internet Information Services
TFTP (Trivial File Transfer Protocol)
50. An Ethernet MAC (Media Access Control) address consists of...
48 bits.
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
There will be no Internet access.
Initial installation cost may be higher - One central single point of failure (the hub or other device)