SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
encapsulating the data payload.
netstat
The users will not be affected by the change.
Physical
2. TFTP Means...
Trivial File Transfer Protocol
Direct Current
Password Authentication Protocol
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
3. To increase the number of available IP (Internet Protocol) addresses - IPv6 (Internet Protocol version 6) uses which one of the following options?
Password Authentication Protocol
128 bit addresses
Secure Shell
1000BASE-CX
4. A small office network with ten computers uses a cable modem and router to connect to the Internet and distribute services to clients. After several weeks of use - the routers collision LED (Light Emitting Diode) has begun to stay on permanently. Wha
cold site.
Network Address Translator
Proxy server
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
5. In a fully Meshed network - every node has a connection to every other node - 7+6+5+4+3+2+1=28 Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
Network News Transfer Protocol
It is an address assigned to a NIC (Network Interface Card).
CSU / DSU (Channel Service Unit / Data Service Unit)
Global Positioning System
6. Network
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Network File System
Two or more connected computers that can share resources
Bayonet-Neill-Concelman or British Naval Connector
7. An administrator is unsuccessful when attempting to ping a network device on a remote site with a firewall in between. In order for the administrator to be successful - what protocol needs to be allowed through the firewall?
VPN (Virtual Private Network)
169.254.1.1
rlogin
ICMP (Internet Control Message Protocol)
8. CPU means...
Central Processing unit
SMB (Server Message Block)
2
The device ID (Identification)
9. POTS means...
PDC (Primary Domain Controller)
Plain Old Telephone Service
TCP / IP (Transmission Control Protocol / Internet Protocol)
Select the most probable cause
10. A new intranet web server has been installed for a company. The clients access the intranet server by its DNS (Domain Name Service) name. To automatically change the clients to connect to the new server - an administrator modifies the DNS (Domain Nam
3.1
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
User Datagram Protocol. This protocol is connectionless and routable.
The file has been opened by another user and is open for read only.
11. A company wants to have an intranet. Where would the intranet web server be located in the network?
In the LAN (Local Area Network)
nslookup
RJ-11 (Registered Jack)
Internetwork Packet Exchange/Sequenced Packet Exchange
12. Given the following output - which utility was used? Default Server: bigserver.datacenter.com Address: 4.12.18.1
Easy to install - Inexpensive - Less actual cable required
Internet Control Message Protocol
Packets from entering and leaving a network
nslookup
13. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?
Any network device with an IP address
A long length of antenna extension cable
An eight-position connector which uses UTP (Unshielded Twisted Pair).
D. Switch and bridge
14. What is IPSEC? Why is it significant?
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Internet Protocol Security. This is the defacto standard for VPN security.
1000BASE-CX
15. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
10
Transmission Control Protocol/Internet Protocol
NetBios
Simple Network Management Protocol
16. HTTP Means...
72.16.16.1
CSU / DSU (Channel Service Unit / Data Service Unit)
Hypertext transfer protocol
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
17. What is on Port 8080?
Proxy Server
D. Switch and bridge
6
22
18. What is PPP?
Token passing
Point to Point Protocol
encapsulating the data payload.
Internetwork Packet Exchange/Sequenced Packet Exchange
19. A home user has been assigned one static IP (Internet Protocol) address. If the user wishes to use the 192.168.0.1 address range - what technology should the user implement?
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Proxy server
rp
2
20. What is RARP?
Reverse Address Resolution Protocol.
TFTP (Trivial File Transfer Protocol)
They are connected to a switch when trying to capture packets.
48 bits.
21. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model?
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
TCP / IP (Transmission Control Protocol / Internet Protocol)
D. Switch and bridge
10
22. Which one of the following communication protocols does a UNIX system primarily rely on?
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
TCP / IP (Transmission Control Protocol / Internet Protocol)
172.192.4.256
Hybrid hub
23. What is EGP?
Exterior Gateway Protocol
111
48 bits.
10 GBASE-LR
24. Which media access method is used for an IEEE (Institute of Electrical and Electronics Engineers) 802.5 network?
Token passing
TFTP (Trivial File Transfer Protocol)
Challenge Handshake Authentication Protocol
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
25. GPS means...
SMTP Server
Network Address Translator
cold site.
Global Positioning System
26. TCP means...
Public Switched Telephone Network
Routing Information Protocol
Password Authentication Protocol
Transmission Control Protocol
27. List the drawbacks of a star topology
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
Initial installation cost may be higher - One central single point of failure (the hub or other device)
802.1x
Digital Subscriber Line
28. What is a MAC (Media Access Control) address?
It is an address assigned to a NIC (Network Interface Card).
SSL (Secure Sockets Layer)
802.11i
443
29. On what Port is Telnet?
22
Reverse Address Resolution Protocol.
23
Presentation
30. DC means...
Transmission Control Protocol/Internet Protocol
Direct Current
An old microwave oven is being used in the break room which causes interference with the access point.
2
31. What is on Port 3389?
Physical
Two or more connected computers that can share resources
RDP/ Terminal Services
1000BASE-CX
32. Which protocol is used for error reporting in concert with the IP protocol?
Global Positioning System
Open Source Path First - this is a routing protocol
Network News Transfer Protocol
ICMP (Internet Control Message Protocol)
33. SNMP Means...
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Internet Service Provider
Simple Network Management Protocol
Packets from entering and leaving a network
34. A company wishes to establish a secure network connection with a sister company over the Internet. Both companies must have access to each others resources without allowing general public access. What describes the type of network that should be empl
Extranet
Internet mail access protocol
Hypertext transfer protocol
Point to Point Protocol
35. MLI Means...
Multiple Link Interface
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
The Internet router is blocking port 25.
Quality of Service
36. AC means...
Point to Point Tunneling Protocol
Alternating Current
20 & 21
Transmission Control Protocol
37. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
10 GBASE-LR
Post Office Protocol
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
38. EMI means...
Electromagnetic Interference
T1 (T-Carrier Level 1).
Telnet
Manages network applications
39. Describe a star topology
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Plain Old Telephone Service
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
40. MAC Means...
53
Media Access Control
A striped set array with parity
Packets from entering and leaving a network
41. Examples of valid WEP (Wired Equivalent Privacy) key lengths
An exact duplicate of the infrastructure is mirrored offsite.
389
netstat
40 bit - 128 bit - 64 bit
42. FTP Means
389
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
File Transfer Protocol
Any network device with an IP address
43. What is Multicast Transmission?
161 & 162
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Internet Information Services
Packets from entering and leaving a network
44. A facility designed to receive computer equipment during a disaster recovery is known as a...
The amber light is flashing occasionally and the green light is lit steadily.
An old microwave oven is being used in the break room which causes interference with the access point.
Plain Old Telephone Service
cold site.
45. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
SMTP Server
BootP (Boot Protocol)
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
46. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
169.254.1.1
rlogin
Point to Point Protocol
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
47. The Spanning-Tree Protocol allows for redundancy of what networking device?
The file has been opened by another user and is open for read only.
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
Bridge
Forward the packets to all ports except the one that originated the request
48. Which one of the following choices is the MOST secure place to store tape backups?
Domain Name Service OR Domain Name Server
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Post Office Protocol 3
In a locked room in an offsite location
49. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
Wireless Fidelity
25
Network News Transfer Protocol
10 GBASE-LR
50. FQDN means...
Client - protocol - and adapter
Fully Qualified Domain Name
Token passing
traceroute