SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which protocol does a diskless workstation use to obtain a network address?
Telnet
Token passing
BootP (Boot Protocol)
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
2. GUI means
raphical User Interface
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
The file has been opened by another user and is open for read only.
TFTP (Trivial File Transfer Protocol)
3. Given the output: 1.pgw (129.6.80.254) * 4ms 3ms 2.129.6.1.245 (129.6.1.245) 4ms 3ms * 3.129.6.2.252 (129.6.2.252) 5ms 5ms 4ms Which of the following commands causes the results above?
traceroute
Transport
Application
172.192.4.256
4. A user has set up filtering on an Internet router. The local SMTP (Simple Mail Transfer Protocol) server has stopped sending or receiving messages from the Internet. What is the cause of the problem?
25
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
The Internet router is blocking port 25.
Media Access Unit - Media attachment Unit
5. A company wants to have an intranet. Where would the intranet web server be located in the network?
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Lightweight Directory Access Protocol
ifconfig
In the LAN (Local Area Network)
6. Print Server
Point to Point Protocol
Port 161 is SNMP and Port 162 is the SNMP Manager
Manages printers on the network
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
7. List the drawbacks of a bus topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. A facility designed to receive computer equipment during a disaster recovery is known as a...
cold site.
Proxy Server
Internet Protocol Security
Asynchronous Transfer Mode
9. A network administrator adds a router to create a new subnet. Which of the following network services requires configuration to accommodate NetBIOS (Network Basic Input / Output System) on the new network?
Multipurpose Internet Mail Extension
SSH
WINS (Windows Internet Name Service)
TFTP (Trivial File Transfer Protocol)
10. A network has grown to include seventy 24 port Ethernet switches and has decreased in performance steadily as new switches are added. What adjustments can be made to the infrastructure to improve the performance?
69
Packets from entering and leaving a network
514
Implement VLANs (Virtual Local Area Network)
11. AC means...
Electromagnetic Interference
Port 20 must also be unblocked.
Wireless LAN
Alternating Current
12. An administrator has been called to consult on a network. After receiving network traffic statistics - the administrator notices that there is an abnormally high amount of DHCP (Dynamic Host Configuration Protocol) traffic. What recommendation would
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Point to Point Protocol
Wireless Fidelity
A long length of antenna extension cable
13. NTP means...
User Datagram Protocol
Network Interface Card
Network Time Protocol
Manages printers on the network
14. SNMP Means...
Simple Network Management Protocol
They are connected to a switch when trying to capture packets.
As a way to share resources and information
192.168.96.254
15. SSL Means...
The file has been opened by another user and is open for read only.
As a way to share resources and information
Wireless LAN
Secure Sockets Layer
16. Which command will produce the following output? ethoLink encap : Ethernet HWaddr: 00:80:C8:D6:74:43 inet adder : 4.150.6.3 Bcast : 4.255.255.255 Mask: 255.0.0.0
SMTP Server
A 2.4 GHz (Gigahertz) cordless telephone is in use.
In the LAN (Local Area Network)
ifconfig
17. What is on Port 69?
Basic Rate Interface
PDC (Primary Domain Controller)
TFTP (Trivial File Transfer Protocol)
25
18. A companys disaster recovery plan requires that a hot site be maintained for fault tolerance. Which of the following would achieve this goal?
An exact duplicate of the infrastructure is mirrored offsite.
Exterior Gateway Protocol
Telnet
ICMP (Internet Control Message Protocol)
19. Which layer of the OSI (Open Systems Interconnect) model handles formatting and code conversion?
Presentation
Public Key Infrastructure
ping
TFTP (Trivial File Transfer Protocol)
20. What is IPSEC? Why is it significant?
Internet Control Message Protocol
80
Provides remote users with access to the network through modems and an IP connection
Internet Protocol Security. This is the defacto standard for VPN security.
21. NFS Means...
IMAP (Mail Client)
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Simple Network Management Protocol
Network File System
22. WEP Means...
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
User Datagram Protocol
192.168.96.254
Wired Equivalent Privacy
23. GSM means...
Intrusion Detection System
Global System for Mobile Communications
File Transfer Protocol
Presentation
24. DSL means...
Firewall
Server Message Block OR Small-to-Midsize Business
Digital Subscriber Line
Wired Equivalent Privacy
25. Which OSI (Open Systems Interconnect) layer converts digital data into electronic signals to beput on a wire?
Physical
802.11
Metropolitan Area Network
TFTP (Trivial File Transfer Protocol)
26. When one connection to a host fails in a full mesh network - it means...
Internetwork packet exchange
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
A transmission method in which data goes form a source node to all other nodes on a network. Each node receives the data and acts on it - which can generate a great deal of network traffic.
All hosts can communicate.
27. Which of the following choices describes an RJ-45 (Registered Jack) connector?
Telnet
An eight-position connector which uses UTP (Unshielded Twisted Pair).
802.11i
netstat and ping
28. Given the MAC address 00:B0:D0:5A:E1:B5 - what does 5A:E1:B5 identify?
Switches - bridges - and NICs (Network Interface Card)
Simple Network Management Protocol
bytes 1-3
The device ID (Identification)
29. List the benefits of a bus topology
Easy to install - Inexpensive - Less actual cable required
Client - protocol - and adapter
802.11i
HTTP
30. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
Server Message Block OR Small-to-Midsize Business
Handles the call center and call routing and can be thought of as a sophisticated network answering machine
bytes 1-3
encapsulating the data payload.
31. The 802.11 frequency band is...
DNS
Each computer is directly connected to other computers in the same network and data flows in a circle shape from computer to computer and eventually back to the source. This topology isn't very popular because it's not easily scalable and the cable r
As a way to share resources and information
2.4 GHz (Gigahertz).
32. ACL means...
PPP (Point-to-Point Protocol)
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
Secure Shell
Access Control List
33. What is on Port 25?
Secure Shell
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Multiple Link Interface
SMTP Server
34. What is on Port 8080?
Digital Subscriber Line
Network Address Translation
Proxy Server
69
35. MAN Means...
Metropolitan Area Network
Client - protocol - and adapter
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
Any device on the network that can ask for access to resources
36. Which UNIX service provides interoperability with Windows file and print sharing?
Token passing
SMB (Server Message Block)
The users will not be affected by the change.
Basic Rate Interface
37. Which physical topology is used by a 10BASE2 network?
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
Industry Standards Organization
Bus
CSU / DSU (Channel Service Unit / Data Service Unit)
38. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
169.254.1.1
Handles e-mail functions
Put a router between the two network segments
the NIC (Network Interface Card) is bad.
39. An employee needs to access the internal secure company web site from a hotel. The employee will need which of the following connections?
53
Any device on the network that can ask for access to resources
Handles tasks in the place of other machines on the network
Internet connection
40. Which one of the following is an IEEE (Institute of Electrical and Electronics Engineers) fiber optic standard?
traceroute
Internetwork packet exchange
bytes 1-3
10 GBASE-LR
41. All of the following are true statements about private IP (Internet Protocol) addressing EXCEPT...
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
10 GBASE-LR
8080
WEP (Wired Equivalent Privacy)
42. What is PAT?
Hypertext transfer protocol
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Port Address Translator
Bluetooth enabled cell phones
43. Which of the following options allows for secure communication over the Internet?
VPN (Virtual Private Network)
Internet connection
Asynchronous Transfer Mode
There will be no Internet access.
44. ISP Means...
Internet Service Provider
POP3
Networked Basic Input/Output System
Bridge
45. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
Gateway
TFTP (Trivial File Transfer Protocol)
Internet connection
The file has been opened by another user and is open for read only.
46. A computer that is working on a network is unplugged and then plugged into another switch with a new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not come on. All of the following could be the source of the prob
Network Time Protocol
the NIC (Network Interface Card) is bad.
The Internet router is blocking port 25.
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
47. Which digital interface device is used to connect to a local service providers digital T1 (T-Carrier Level 1) or E1 network?
CSU / DSU (Channel Service Unit / Data Service Unit)
Public Key Infrastructure
MAC (Media Access Control) address
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
48. Web Server
100BASE-FX Answer: D
Application
nslookup
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
49. What is NAT?
143
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Any network device with an IP address
Network Address Translator
50. A firewall can be used to prevent which of the following?
Packets from entering and leaving a network
Internet Control Message Protocol
SSL (Secure Sockets Layer)
netstat and ping