SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. RDP means...
An exact duplicate of the infrastructure is mirrored offsite.
Remote Desktop Protocol
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
To decrease network congestion Answer: D
2. Which one of the following is true concerning bridges and their forwarding decisions?
Simple Network Management Protocol
10 GBASE-LR
Network Address Translation
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
3. Which one of the following IEEE (Institute of Electrical and Electronics Engineers) standards uses
Any network device with an IP address
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
bytes 1-3
1000BASE-LX and10 GBASE-LR
4. An employee needs to access the internal secure company web site from a hotel. The employee will need which of the following connections?
Internet connection
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
gateway.
Point to Point Tunneling Protocol
5. IDS means...
Bridge
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Intrusion Detection System
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
6. On what Port is SSH?
Internet Protocol Security
22
Authentication
PPP (Point-to-Point Protocol)
7. All of the following are benefits of IPv6 (Internet Protocol version 6) EXCEPT...
larger subnet masks.
Post Office Protocol
Manages printers on the network
SMB (Server Message Block)
8. FDDI (Fiber Distributed Data Interface) operates at what speed?
TFTP (Trivial File Transfer Protocol)
ifconfig
100 Mbps (Megabits per second)
Any device on the network that can ask for access to resources
9. What is the mechanism a DHCP (Dynamic Host Configuration Protocol) server uses to track which IP (Internet Protocol) address is assigned to a particular computer?
3389
6
Telnet
MAC (Media Access Control) address
10. SSID Means...
Service Set Identifier
Hard to troubleshoot - Difficult to change or move - Doesn't offer much fault tolerance
TFTP (Trivial File Transfer Protocol)
Port Address Translator
11. ATM Means...
Asynchronous Transfer Mode
10 GBASE-LR
It is an address assigned to a NIC (Network Interface Card).
CSU / DSU (Channel Service Unit / Data Service Unit)
12. On what Port is HTTP?
3389
80
Client - protocol - and adapter
Proxy Server
13. BRI Means...
Implement VLANs (Virtual Local Area Network)
Address Resolution Protocol. Has no error control.
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Basic Rate Interface
14. NTFS Means...
Wireless LAN
10
Password Authentication Protocol
New Technology File System
15. On what Port is LDAP?
389
Central Processing unit
SMTP Server
Sys Log (Unix) or Event Manager (Windows)
16. GPS means...
Transmission Control Protocol
802.2
Post Office Protocol
Global Positioning System
17. Which OSI (Open Systems Interconnect) layer provides interfaces to the user that enable programs to use network services?
Application
Challenge Handshake Authentication Protocol
ICMP (Internet Control Message Protocol)
Light Emitting Diode
18. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
The amber light is flashing occasionally and the green light is lit steadily.
Internet Service Provider
169.254.1.1
111
19. SSH Means...
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Secure Shell
192.168.96.254
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
20. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
6
passing a username and password in plaintext.
550 meters (1 -804.46 feet)
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
21. Which physical topology is used by a 10BASE2 network?
Network Interface Card
SUN RPC
Bus
Quality of Service
22. Which protocol is used for error reporting in concert with the IP protocol?
The amber light is flashing occasionally and the green light is lit steadily.
User Datagram Protocol
ICMP (Internet Control Message Protocol)
All hosts can communicate.
23. On a switched Ethernet network that is operating perfectly - what is the state in which a user will find the activity LED (Light Emitting Diode)?
Periodically (randomly) blinking
ifconfig
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
POP3
24. ACL means...
Run more than one central processing unit (CPU) and whose resources are available to other users on the network to access when needed. Something this powerful is typically referred to only as a server today. Don't confuse workstations with client mac
PPTP (Point-to-Point Tunneling Protocol)
Access Control List
Point-to-Point Tunneling Protocol
25. IPX Means...
Internetwork packet exchange
A long length of antenna extension cable
Bridge
10 GBASE-LR
26. EMI means...
BootP (Boot Protocol)
Global Positioning System
Password Authentication Protocol
Electromagnetic Interference
27. Which of the following choices describes an RJ-45 (Registered Jack) connector?
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
Authentication
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Networked Basic Input/Output System
28. List the benefits of a star topology
29. What is on Port 443?
WINS (Windows Internet Name Service)
HTTPS/ SSL
There will be no Internet access.
Wireless Fidelity
30. A computer that is working on a network is unplugged and then plugged into another switch with a new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not come on. All of the following could be the source of the prob
Any network device with an IP address
the NIC (Network Interface Card) is bad.
1000BASE-CX
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
31. On what Port is DNS?
53
Peer-To-Peer and Client-Server
Exterior Gateway Protocol
802.1x
32. PKI means...
raphical User Interface
Trivial File Transfer Protocol
Time domain reflectometer
Public Key Infrastructure
33. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
Network and Transport
Handles e-mail functions
10 GBASE-LR
SSH
34. What are the two main network types?
Connect Workstation 6 and Workstation 2 using a barrel connector
Peer-To-Peer and Client-Server
ifconfig
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
35. A network administrator needs to verify that the SMTP (Simple Mail Transfer Protocol) service is running on a particular server. On what port number should a Telnet session be established?
25
Put a router between the two network segments
Domain Name Service OR Domain Name Server
Password Authentication Protocol
36. List the drawbacks of a bus topology
37. In which OSI (Open Systems Interconnect) layer does a bridge operate?
gateway.
Data Link
The file has been opened by another user and is open for read only.
Periodically (randomly) blinking
38. WPA Means...
BootP (Boot Protocol)
the NIC (Network Interface Card) is bad.
Exterior Gateway Protocol
Wireless Protected Access
39. What enables a UNIX computer to access exported file systems from other UNIX computers?
72.16.16.1
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
NFS (Network File System)
3389
40. On what Port is Telnet?
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Hypertext Markup Language
23
41. A user connects to the companys intranet server via a VPN (Virtual Private Network) connection from a SOHO (Small Office / Home Office) using the broadband service. One day - the user cannot successfully connect to the VPN (Virtual Private Network) a
File Transfer Protocol
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
The file has been opened by another user and is open for read only.
An eight-position connector which uses UTP (Unshielded Twisted Pair).
42. What is UDP? What are some of its attributes?
1000BASE-LX and10 GBASE-LR
Plain Old Telephone Service
Institute of Electrical and Electronics Engineers
User Datagram Protocol. This protocol is connectionless and routable.
43. List the benefits of a bus topology
Easy to install - Inexpensive - Less actual cable required
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Connect Workstation 6 and Workstation 2 using a barrel connector
Any network device with an IP address
44. At which layer of the OSI (Open Systems Interconnect) model does UDP (User Datagram Protocol) reside?
Manages network applications
Transport
Proxy
Multipurpose Internet Mail Extension
45. Fault Tolerance
ICMP (Internet Control Message Protocol)
NetBios
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
VPN (Virtual Private Network)
46. Which command generated the following output? Active Connections Proto Local Address Foreign Address State TCP CompA:3006 192.168.0.2:Microsoft Established TCP CompA:3021 192.168.0.246:HTTP Established
netstat
Hypertext transfer protocol over secure sockets layer.
2.4 GHz (Gigahertz).
SSL (Secure Sockets Layer)
47. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
CSU / DSU (Channel Service Unit / Data Service Unit)
A 2.4 GHz (Gigahertz) cordless telephone is in use.
Any device on the network that can ask for access to resources
48. A network administrator is in charge of a large corporate network containing a DNS (Domain Name Service) server - DHCP (Dynamic Host Configuration Protocol) server - and an internal web server. One particular subnet is experiencing trouble with Inter
48 bits.
A network map showing exactly how data moves through the network.
Packets from entering and leaving a network
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
49. Which protocol does a diskless workstation use to obtain a network address?
BootP (Boot Protocol)
Service Set Identifier
Networked Basic Input/Output System Extended User Interface
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
50. Which standard covers the methods for performing authentication services for remote access to a central LAN (Local Area Network)?
Global Positioning System
A striped set array with parity
Exterior Gateway Protocol
802.1x