SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IDS means...
100BASE-FX Answer: D
larger subnet masks.
Network Time Protocol
Intrusion Detection System
2. Which of the following methods transfers files with the use of a UDP (User Datagram Protocol)?
rlogin
Plain Old Telephone Service
Data Link
TFTP (Trivial File Transfer Protocol)
3. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
PPTP (Point-to-Point Tunneling Protocol)
SMB (Server Message Block)
encapsulating the data payload.
Switches - bridges - and NICs (Network Interface Card)
4. POP3 Means...
Post Office Protocol 3
Wireless LAN
They get their name because they truly are 'at the service' of the network and run specialized software for the network's maintenance and control known as the network operating system. Sometimes servers have more than one job. But whether servers are
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
5. Which protocol is used for error reporting in concert with the IP protocol?
ICMP (Internet Control Message Protocol)
Implement VLANs (Virtual Local Area Network)
Firewall
Public Switched Telephone Network
6. What is IPSEC? Why is it significant?
Internet Protocol Security. This is the defacto standard for VPN security.
Check the connection from the WAP (Wireless Access Point) to the network
In a locked room in an offsite location
The device ID (Identification)
7. NNTP Means...
Network News Transfer Protocol
Uniform Resource Locator
Global System for Mobile Communications
Peer-To-Peer and Client-Server
8. NTFS Means...
New Technology File System
72.16.16.1
10 GBASE-LR
Integrated Services digital Network
9. A network administrator is configuring a router to support a new subnet on a TCP / IP (Transmission Control Protocol / Internet Protocol) network. The subnet uses 192.168.96.0/24. The administrators company policy is to reserve the highest IP (Intern
As a way to share resources and information
802.11
PPP (Point-to-Point Protocol)
192.168.96.254
10. This is not a valid IP (Internet Protocol) addresses
SSL (Secure Sockets Layer)
1000BASE-CX
172.192.4.256
Bridge
11. When one connection to a host fails in a full mesh network - it means...
Wireless Fidelity
All hosts can communicate.
netstat
TFTP (Trivial File Transfer Protocol)
12. On what Port is IMAP?
Post Office Protocol
143
Put a router between the two network segments
Network and Transport
13. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
48 bits.
Any network device with an IP address
rp
Media Access Unit - Media attachment Unit
14. URL Means...
Media Access Unit - Media attachment Unit
Uniform Resource Locator
cold site.
PPP (Point-to-Point Protocol)
15. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
The file has been opened by another user and is open for read only.
Reverse Address Resolution Protocol.
Multipurpose Internet Mail Extension
Packets from entering and leaving a network
16. Which one of the following provides a fault-tolerant storage system containing five disks and a single controller that will function if a single disk fails?
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
In a locked room in an offsite location
A striped set array with parity
Basic Rate Interface
17. List the drawbacks of a ring topology
File Transfer Protocol
802.1x
TFTP (Trivial File Transfer Protocol)
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
18. What is on Port 111?
10
SUN RPC
Post Office Protocol 3
Wireless Access Point
19. Workstations
20. Which of the following choices describes an RJ-45 (Registered Jack) connector?
10 GBASE-LR
New Technology File System
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Port 20 must also be unblocked.
21. Name the seven most common physical topologies
Time domain reflectometer
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Service Set Identifier
It is an address assigned to a NIC (Network Interface Card).
22. WAP Means...
Wireless Access Point
The Internet router is blocking port 25.
135-139
Firewall
23. Logical Topology
3.1
Time domain reflectometer
Wireless LAN
A network map showing exactly how data moves through the network.
24. A user would like to implement a secure ordering system on a web server. Which of the following protocols is installed?
1433
The capability of a computer or a network system to respond to a condition automatically - often resolving it - reducing the impact on the system.
SSL (Secure Sockets Layer)
Telnet
25. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
Network Address Translator
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
the NIC (Network Interface Card) is bad.
In the LAN (Local Area Network)
26. Which protocol is the fastest file transfer protocol?
Alternating Current
Bridge
802.11b
TFTP (Trivial File Transfer Protocol)
27. Which of the following options allows for secure communication over the Internet?
ICMP (Internet Control Message Protocol)
BootP (Boot Protocol)
VPN (Virtual Private Network)
Secure Sockets Layer
28. Which one of the following communication protocols does a UNIX system primarily rely on?
Easy to install - Inexpensive - Less actual cable required
TCP / IP (Transmission Control Protocol / Internet Protocol)
T1 (T-Carrier Level 1).
MAC (Media Access Control) address
29. Which protocol does a diskless workstation use to obtain a network address?
Access Control List
BootP (Boot Protocol)
PPTP (Point-to-Point Tunneling Protocol)
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
30. Network
Two or more connected computers that can share resources
Metropolitan Area Network
802.11a.
Extensible Authentication Protocol. It is used in 3rd party authentication providers/ multi-factor authentication.
31. LAN Means...
The users will not be affected by the change.
A long length of antenna extension cable
Local Area Network
Internet Protocol Security
32. Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?
Public Key Infrastructure
550 meters (1 -804.46 feet)
RJ-11 (Registered Jack)
Gateway
33. A computer that is working on a network is unplugged and then plugged into another switch with a new cable. The link LED (Light Emitting Diode) on the NIC (Network Interface Card) does not come on. All of the following could be the source of the prob
They are connected to a switch when trying to capture packets.
Any network device with an IP address
CSU / DSU (Channel Service Unit / Data Service Unit)
the NIC (Network Interface Card) is bad.
34. TDR means...
The 'memo maker' that sends and receives paperless faxes over the network
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Global System for Mobile Communications
Time domain reflectometer
35. What is PAT?
MAC (Media Access Control) address
Port Address Translator
raphical User Interface
User Datagram Protocol
36. On what Port is SNMP?
TCP / IP (Transmission Control Protocol / Internet Protocol)
nslookup
Switches - bridges - and NICs (Network Interface Card)
161 & 162
37. A client workstation can authenticate user names and passwords to which type of server?
User Datagram Protocol
23
PDC (Primary Domain Controller)
Hybrid hub
38. IPSEC means...
Internet Protocol Security
10
Bayonet-Neill-Concelman or British Naval Connector
Router
39. Which protocol could be used by a VPN (Virtual Private Network)?
128 bit addresses
Internet connection
PPTP (Point-to-Point Tunneling Protocol)
80
40. What is on Port 514?
802.11
Sys Log (Unix) or Event Manager (Windows)
Service Set Identifier
Network Time Protocol
41. What is the maximum length of a gigabit Ethernet segment using MMF (MultiMode Fiber) optic cable?
550 meters (1 -804.46 feet)
User Datagram Protocol
143
Fully Qualified Domain Name
42. An administrator changes the lease time of the DHCP (Dynamic Host Configuration Protocol) scope from one week to one day. What affect will this have on the end users?
Sys Log (Unix) or Event Manager (Windows)
Periodically (randomly) blinking
The users will not be affected by the change.
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
43. A workstation with a static IP (Internet Protocol) address can print and authenticate to a server - but cannot browse to www.comptia.org. What is the FIRST item to troubleshoot?
Reverse Address Resolution Protocol.
Digital Subscriber Line
DNS (Domain Name Service) server settings
CSU / DSU (Channel Service Unit / Data Service Unit)
44. IPX Means...
Internetwork packet exchange
69
Access Control List
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
45. A user has set up filtering on an Internet router. The local SMTP (Simple Mail Transfer Protocol) server has stopped sending or receiving messages from the Internet. What is the cause of the problem?
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Primary Rate Interface
The Internet router is blocking port 25.
CSU / DSU (Channel Service Unit / Data Service Unit)
46. A technician connects a computer to the LAN (Local Area Network) switch to analyze the traffic occurring from another computer on the network. The only traffic observed coming from the other computer is broadcast frames. What can be concluded from th
The analyzer is functioning properly.
Uniform Resource Locator
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
New Technology File System
47. Which of the following connectors will be required for a RAS (Remote Access Service) server accepting four incoming dial-up connections to connect to the PSTN (Public Switched Telephone Network)?
Someone has enabled an additional DHCP (Dynamic Host Configuration Protocol) server.
RJ-11 (Registered Jack)
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
Internet Control Message Protocol
48. DC means...
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Hybrid hub
Wireless LAN
Direct Current
49. Describe a star topology
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
550 meters (1 -804.46 feet)
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Physical
50. Which one of the following options is a security standard for 802.11?
1
An exact duplicate of the infrastructure is mirrored offsite.
Domain Name Service OR Domain Name Server
WEP (Wired Equivalent Privacy)