SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is on Port 53?
netstat
Domain Name Service OR Domain Name Server
DNS
Internet Protocol
2. Around noon - 802.11b wireless users near the break room have intermittent - random connections. What is the problem?
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.
An old microwave oven is being used in the break room which causes interference with the access point.
Port Address Translator
Port 20 must also be unblocked.
3. Which two utilities can be used to find out what IP (Internet Protocol) address resolves from a domain name?
Hypertext Markup Language
Token passing
Integrated Services digital Network
netstat and ping
4. PKI means...
Public Key Infrastructure
Extranet
Client - protocol - and adapter
Hypertext transfer protocol over secure sockets layer.
5. Which one of the following servers provides web caching services?
Intrusion Detection System
Proxy
SSH
Public Key Infrastructure
6. A packet filtering firewall operates at which layers of the OSI (Open Systems Interconnect) model?
A network map showing exactly how data moves through the network.
An exact duplicate of the infrastructure is mirrored offsite.
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Network and Transport
7. What is on Port 1433?
Local Area Network
WINS (Windows Internet Name Service)
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
SQL Server
8. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
111
161 & 162
rp
L2TP (Layer 2 Tunneling Protocol)
9. MAU means...
Wired Equivalent Privacy
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Media Access Unit - Media attachment Unit
Media Access Control
10. What is CHAP?
Challenge Handshake Authentication Protocol
Post Office Protocol 3
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
11. Which of the following connectors will be required for a RAS (Remote Access Service) server accepting four incoming dial-up connections to connect to the PSTN (Public Switched Telephone Network)?
RJ-11 (Registered Jack)
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
Eliminate any sources of RFI (Radio Frequency Interference) around the WAP (Wireless Access Point) Answer: D
SSH
12. ISO Means...
Industry Standards Organization
Internet Protocol Security
WINS (Windows Internet Name Service)
550 meters (1 -804.46 feet)
13. MPLS
The Internet router is blocking port 25.
MultiProtocol Label Switching
389
Re-enter the username and password in the VPN (Virtual Private Network) connection and reconnect
14. What is OSPF?
Network File System
143
Transmission Control Protocol/Internet Protocol
Open Source Path First - this is a routing protocol
15. UDP Means...
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Data Link
Basic Input/Output System
User Datagram Protocol
16. A facility designed to receive computer equipment during a disaster recovery is known as a...
cold site.
Switches - bridges - and NICs (Network Interface Card)
WINS (Windows Internet Name Service)
1
17. On what Port is SUN RPC?
Transport
111
A network's physical topology gives you the lay of the land and the logical topology illustrates how the signals and data travel throughout the layout.
They are connected to a switch when trying to capture packets.
18. Name the seven most common physical topologies
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
Network Access Control
Routing Information Protocol
Firewall
19. The IPSec (Internet Protocol Security) protocol suite can secure network transmissions by...
1433
CSU / DSU (Channel Service Unit / Data Service Unit)
encapsulating the data payload.
Application
20. What is PAT?
Bluetooth enabled cell phones
Server Message Block OR Small-to-Midsize Business
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Port Address Translator
21. TCP/IP Means;
ifconfig
the NIC (Network Interface Card) is bad.
Quality of Service
Transmission Control Protocol/Internet Protocol
22. All of the following options transmit data over a modem EXCEPT...
Extranet
D. Switch and bridge
Point to Point Protocol
T1 (T-Carrier Level 1).
23. What is on Port 111?
MT-RJ (Mechanical Transfer-Registered Jack)
Router
Manages network applications
SUN RPC
24. On what Port is NetBios?
Internet Protocol Security
10 GBASE-LR
135-139
An eight-position connector which uses UTP (Unshielded Twisted Pair).
25. How many concurrent connections can a Windows 2000 Professional computer support on a single share?
Quality of Service
10
Global Positioning System
Internet Protocol
26. Which of the following choices describes an RJ-45 (Registered Jack) connector?
Have the administratorrecreate the shares to be named networkshares and privateshares in order to modify the share names to acceptable lengths
An eight-position connector which uses UTP (Unshielded Twisted Pair).
3389
Implement VLANs (Virtual Local Area Network)
27. What is LEAP?
Primary Rate Interface
Token passing
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
28. Which of the following is a self-assigned address based on APIPA (Automatic Private Internet Protocol Addressing)?
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
Any device on the network that can ask for access to resources
169.254.1.1
29. On what Port is HTTP?
Wireless LAN
Internet Service Provider
BootP (Boot Protocol)
80
30. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
HTTP
53
Application
31. Examples of valid WEP (Wired Equivalent Privacy) key lengths
larger subnet masks.
80
40 bit - 128 bit - 64 bit
WEP (Wired Equivalent Privacy)
32. What is Multicast Transmission?
MT-RJ (Mechanical Transfer-Registered Jack)
Secure Shell
Configure the DHCP (Dynamic Host Configuration Protocol) server to increase lease expiration time
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
33. A client accessing a network share folder has authenticated into the system and has full access rights to a folder share. But after opening the file they find they cannot modify the files contents. What is the likely cause?
Sundays full backup as well as Mondays - Tuesdays - and Wednesdays tapes
Any network device with an IP address
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
The file has been opened by another user and is open for read only.
34. PRI Means...
Primary Rate Interface
Electromagnetic Interference
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
1000BASE-CX
35. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
Sys Log (Unix) or Event Manager (Windows)
Exterior Gateway Protocol
netstat
BootP (Boot Protocol)
36. Which protocol does a diskless workstation use to obtain a network address?
Provides remote users with access to the network through modems and an IP connection
cold site.
HTTP
BootP (Boot Protocol)
37. RDP means...
Networked Basic Input/Output System
Internet Protocol Security
Remote Desktop Protocol
An eight-position connector which uses UTP (Unshielded Twisted Pair).
38. A rogue residential gateway has been installed in a network. It is running DHCP (Dynamic Host Configuration Protocol). If the computers have static IP (Internet Protocol) addresses assigned - what problems might exist on the network?
Hypertext transfer protocol over secure sockets layer.
A transmission method in which data is sent from a server to specific nodes that are defined as members of a multicast group. Network nodes not in the group ignore the data.
There will be no Internet access.
New Technology File System
39. To increase the number of available IP (Internet Protocol) addresses - IPv6 (Internet Protocol version 6) uses which one of the following options?
PPTP (Point-to-Point Tunneling Protocol)
Bridges operate at OSI (Open Systems Interconnect) Layer 2 and use MAC (Media Access Control) addresses to make decisions.
Basic Rate Interface
128 bit addresses
40. What is on Ports 161 and 162?
private IP (Internet Protocol) addresses must be obtained dynamically from the ISP (Internet Service Provider).
RJ-11 (Registered Jack)
Port 161 is SNMP and Port 162 is the SNMP Manager
Integrated Services digital Network
41. If a destination address is not in a bridges forwarding table - what will the bridge do?
Application
Initial installation cost may be higher - One central single point of failure (the hub or other device)
Forward the packets to all ports except the one that originated the request
ICMP (Internet Control Message Protocol)
42. ISP Means...
Packets from entering and leaving a network
Internet Service Provider
A long length of antenna extension cable
They are connected to a switch when trying to capture packets.
43. Which two devices both operate at the same layer of the OSI (Open Systems Interconnect) model?
Handles e-mail functions
Connect Workstation 6 and Workstation 2 using a barrel connector
Wired Equivalent Privacy
D. Switch and bridge
44. IDS means...
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
1
48 bits.
Intrusion Detection System
45. What is on Ports 135-139?
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
ICMP (Internet Control Message Protocol)
All hosts can communicate.
NetBios
46. On what Port is IMAP?
HTTP
Manages network applications
143
Secure Shell
47. Company A has two networks - one on the west side of town and one on the east side. The network administrator wants to connect the two networks with a leased line but is concerned about limiting broadcast traffic. What can the administrator do to all
Network Time Protocol
MAC (Media Access Control) address
Put a router between the two network segments
the NIC (Network Interface Card) is bad.
48. While reviewing network traffic statistics - technicians have noticed that there is an abnormally high amount of DNS (Domain Name Service) traffic. What recommendation would help reduce traffic?
As a way to share resources and information
Computers are connected to one central point w/ their own individual cables or wireless connections. This topology offers advantages over the bus topology and is used more often despite having more physical requirements than the bus topology. Benefit
Increase the TTL (Time to Live) on the DNS (Domain Name Service) servers
cold site.
49. Which media access method is used for an IEEE (Institute of Electrical and Electronics Engineers) 802.5 network?
Token passing
An exact duplicate of the infrastructure is mirrored offsite.
HTTP
Quality of Service
50. WAP Means...
Wired Equivalent Privacy
Wireless Access Point
raphical User Interface
MAC (Media Access Control) address