SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A network administrator manages a medium-sized network with a mixture of different platform computers. The network contains multiple subnets located across a large geographical area. Over half of the subnets contain a WAP (Wireless Access Point) for
Internet mail access protocol
Network and Transport
2
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
2. What enables a UNIX computer to access exported file systems from other UNIX computers?
Address Resolution Protocol. Has no error control.
Hypertext transfer protocol
NFS (Network File System)
Network Time Protocol
3. FTP Means
HTTPS/ SSL
encapsulating the data payload.
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
File Transfer Protocol
4. Which fiber connector looks similar to an RJ-45 (Registered Jack) connector and connects two strands of fiber?
Network File System
MT-RJ (Mechanical Transfer-Registered Jack)
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
5. On a switched Ethernet network that is operating perfectly - what is the state in which a user will find the activity LED (Light Emitting Diode)?
53
2
Periodically (randomly) blinking
Implement VLANs (Virtual Local Area Network)
6. GPS means...
53
raphical User Interface
Global Positioning System
RDP/ Terminal Services
7. WINS Means...
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Manages printers on the network
Windows Internet Name Service
Media Access Unit - Media attachment Unit
8. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
Media Access Unit - Media attachment Unit
NetBios
rp
MAC (Media Access Control) address
9. LAN Local Area Network
This IP (Internet Protocol) address cannot be pinged remotely.
2.4 GHz (Gigahertz).
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
DNS (Domain Name Service) server settings
10. Servers
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. The 802.11 frequency band is...
Intrusion Detection System
Stores and dispenses files
443
2.4 GHz (Gigahertz).
12. A firewall can be used to prevent which of the following?
1000BASE-CX
Packets from entering and leaving a network
Token passing
The device ID (Identification)
13. MAC Means...
DNS
Presentation
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
Media Access Control
14. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) copper cable standard?
1000BASE-CX
TFTP (Trivial File Transfer Protocol)
Port Address Translator
Transmission Control Protocol
15. A user connects to the companys intranet server via a VPN (Virtual Private Network) connection from a SOHO (Small Office / Home Office) using the broadband service. One day - the user cannot successfully connect to the VPN (Virtual Private Network) a
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
Transmission Control Protocol
135-139
The 'memo maker' that sends and receives paperless faxes over the network
16. WEP Means...
Internetwork packet exchange
Proxy
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
Wired Equivalent Privacy
17. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
Initial installation cost may be higher - One central single point of failure (the hub or other device)
10 GBASE-LR
NetBios
Internet Protocol
18. Which one of the following options is required for a client workstation to connect to a network resource?
Client - protocol - and adapter
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Basic Rate Interface
To decrease network congestion Answer: D
19. When one connection to a host fails in a full mesh network - it means...
Internet Protocol Security. This is the defacto standard for VPN security.
cold site.
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
All hosts can communicate.
20. RIP Means...
ifconfig
Global System for Mobile Communications
Lightweight Directory Access Protocol
Routing Information Protocol
21. GUI means
RDP/ Terminal Services
raphical User Interface
Internet Information Services
File Transfer Protocol
22. POTS means...
Address Resolution Protocol. Has no error control.
Plain Old Telephone Service
Network Address Translation
514
23. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
Quality of Service
The analyzer is functioning properly.
The file has been opened by another user and is open for read only.
Switches - bridges - and NICs (Network Interface Card)
24. TDR means...
CSU / DSU (Channel Service Unit / Data Service Unit)
TFTP (Trivial File Transfer Protocol)
Internet Protocol
Time domain reflectometer
25. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
110
An eight-position connector which uses UTP (Unshielded Twisted Pair).
The users will not be affected by the change.
The device ID (Identification)
26. On what Port is LDAP?
2
389
143
22
27. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
CSU / DSU (Channel Service Unit / Data Service Unit)
netstat and ping
Post Office Protocol
bytes 1-3
28. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
Port Address Translator
128 bit addresses
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
29. On what Port is HTTPS/ SSL?
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
1433
Network Access Control
443
30. Name the seven most common physical topologies
Switches - bridges - and NICs (Network Interface Card)
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Point-to-Point Protocol
SSL (Secure Sockets Layer)
31. DSL means...
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
8080
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
Digital Subscriber Line
32. Which of the following choices describes an RJ-45 (Registered Jack) connector?
An eight-position connector which uses UTP (Unshielded Twisted Pair).
DNS
Simple Network Management Protocol
Hypertext transfer protocol over secure sockets layer.
33. A network technician is troubleshooting a remote home users computer that is behind a SOHO (Small Office / Home Office) router running NAT (Network Address Translation). The technician wants to ping the IP (Internet Protocol) address of the remote us
This IP (Internet Protocol) address cannot be pinged remotely.
Public Switched Telephone Network
6
100BASE-FX Answer: D
34. NNTP Means...
Network News Transfer Protocol
53
SQL Server
Internet Control Message Protocol
35. Physical Topology
100BASE-FX Answer: D
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
PDC (Primary Domain Controller)
Light Emitting Diode
36. MPLS
MultiProtocol Label Switching
passing a username and password in plaintext.
Bus
135-139
37. Telephony Server
Industry Standards Organization
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
Internet Information Services
802.11b
38. ISO Means...
Industry Standards Organization
25
Telnet
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
39. ICMP means...
Internet Control Message Protocol
SMTP Server
Periodically (randomly) blinking
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
40. Which one of the following is true concerning bridges and their forwarding decisions?
Basic Input/Output System
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
ICMP (Internet Control Message Protocol)
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
41. What is the maximum standard distance allowed to connect a customer via an ISDN (Integrated Services Digital Network) line?
encapsulating the data payload.
A. 18 -000 feet (5 -486.4 meters)
Client - protocol - and adapter
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
42. This is not a valid IP (Internet Protocol) addresses
172.192.4.256
TFTP (Trivial File Transfer Protocol)
Wired Equivalent Privacy
The device ID (Identification)
43. A network has grown to include seventy 24 port Ethernet switches and has decreased in performance steadily as new switches are added. What adjustments can be made to the infrastructure to improve the performance?
Implement VLANs (Virtual Local Area Network)
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
172.192.4.256
All workstations except Workstation 3 can communicate to each other.
44. A facility designed to receive computer equipment during a disaster recovery is known as a...
cold site.
Port 161 is SNMP and Port 162 is the SNMP Manager
53
1000BASE-CX
45. What is Broadcast Transmission?
Check the connection from the WAP (Wireless Access Point) to the network
In the LAN (Local Area Network)
Network File System
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
46. The system administrator performs full backups on Sundays. Incremental backups are performed every day EXCEPT Sunday. The backups start at 10 a.m. and end by 12 p.m. The system crashes on Wednesday night. Which tapes must be used to restore data?
Media Access Control
Sys Log (Unix) or Event Manager (Windows)
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
DNS
47. Which one of the following will affect the range of an 802.11b WAP (Wireless Access Point)?
POP3
CSU / DSU (Channel Service Unit / Data Service Unit)
8080
A long length of antenna extension cable
48. Upon which devices can NAT (Network Address Translation) be used?
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
TFTP (Trivial File Transfer Protocol)
They are connected to a switch when trying to capture packets.
Firewall
49. URL Means...
Uniform Resource Locator
Sys Log (Unix) or Event Manager (Windows)
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
To decrease network congestion Answer: D
50. Why did we develop networking?
Global Positioning System
passing a username and password in plaintext.
As a way to share resources and information
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.