SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Network +
Start Test
Study First
Subjects
:
certifications
,
comptia-network-+
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. HTTP Means...
Hypertext transfer protocol
It is an address assigned to a NIC (Network Interface Card).
48 bits.
Manages web-based activities by running Hypertext Transfer Protocol (HTTP) for storing web content and accessing web pages
2. TCP means...
bytes 1-3
Transmission Control Protocol
514
Bus - Star - Ring - Mesh - Point-to-point - Point-to-multipoint - Hybrid
3. An employee needs to access the internal secure company web site from a hotel. The employee will need which of the following connections?
Layer 2 Tunneling Protocol. This is a Cisco proprietary solution.
Access Control List
Address Resolution Protocol. Has no error control.
Internet connection
4. GPS means...
Physical
bytes 1-3
Global Positioning System
72.16.16.1
5. AC means...
Lightweight Directory Access Protocol
The device ID (Identification)
Alternating Current
Implement VLANs (Virtual Local Area Network)
6. Each of the following wireless standards use a 2.4 GHz (Gigahertz) ISM (Industrial - Scientific - and Medical) band EXCEPT...
Point-to-Point Tunneling Protocol
Select the most probable cause
802.11a.
The 'memo maker' that sends and receives paperless faxes over the network
7. Host
Any network device with an IP address
Metropolitan Area Network
Time domain reflectometer
The 'memo maker' that sends and receives paperless faxes over the network
8. Disk mirroring is also known as RAID ___...
1
Border Gateway Multicast Protocol - A routing protocol for router to router activity.
Exterior Gateway Protocol
802.11b
9. What is on Port 25?
Industry Standards Organization
SMTP Server
Internet Protocol Security
Post Office Protocol 3
10. On what Port is HTTP?
netstat
PDC (Primary Domain Controller)
80
Proxy
11. EMI means...
Electromagnetic Interference
10
Change the LANs (Local Area Network) WAP (Wireless Access Point) channel to a different channel than the other two WAPs (Wireless Access Point)
Address Resolution Protocol. Has no error control.
12. WEP Means...
Network Interface Card
10 GBASE-LR
Wired Equivalent Privacy
Manages network applications
13. Client-Server Networks
802.11i
Transport
Client-server networks are the opposite of peer-to-peer networks. A single server uses a network operating system for managing the entire network.
Network Address Translation
14. There is a suspected SMTP (Simple Mail Transfer Protocol) virus on the workstation. E-mail programs are not currently running. Which of the following utilities should be run to see if there are any open SMTP (Simple Mail Transfer Protocol) sockets?
CSU / DSU (Channel Service Unit / Data Service Unit)
netstat
25
Put a router between the two network segments
15. Which one of the following communication protocols does a UNIX system primarily rely on?
TCP / IP (Transmission Control Protocol / Internet Protocol)
Make certain the web site has an external DNS (Domain Name Service) name and a public IP address - and that port 80 is open on the router.
Network Address Translator
Internet Control Message Protocol
16. A new intranet web server has been installed for a company. The clients access the intranet server by its DNS (Domain Name Service) name. To automatically change the clients to connect to the new server - an administrator modifies the DNS (Domain Nam
Problematic workstations have cached the old IP (Internet Protocol) address of the server.
TFTP (Trivial File Transfer Protocol)
In a locked room in an offsite location
T1 (T-Carrier Level 1).
17. Which media access method is used for an IEEE (Institute of Electrical and Electronics Engineers) 802.5 network?
Digital Subscriber Line
Token passing
They are connected to a switch when trying to capture packets.
User Datagram Protocol
18. LED Means...
Telnet
Light Emitting Diode
HTTP
Global Positioning System
19. Describe a bus topology
Consists of two distinct and terminated ends with each computer connected to one unbroken cable running its entire length. All of the computers can see all of the data flowing through but the only one computer the data is addressed to will actually g
An exact duplicate of the infrastructure is mirrored offsite.
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
192.168.96.254
20. An 802.11a/b/g access point is installed in a computer lab. An administrator has a client that is based on 802.11g technology. There are times when the client slows or stops working entirely. What is the cause of the problem?
ICMP (Internet Control Message Protocol)
A 2.4 GHz (Gigahertz) cordless telephone is in use.
A network map defining the specific characteristics of a network such as where workstations and other devices are located and the arrangement of all the physical media such as cables.
NFS (Network File System)
21. On what Port is TFTP?
Multiple Link Interface
69
Any device on the network that can ask for access to resources
Exterior Gateway Protocol
22. What is a MAC (Media Access Control) address?
Forward the packets to all ports except the one that originated the request
It is an address assigned to a NIC (Network Interface Card).
WINS (Windows Internet Name Service)
This IP (Internet Protocol) address cannot be pinged remotely.
23. What is on Port 69?
The file has been opened by another user and is open for read only.
Quality of Service
Network News Transfer Protocol
TFTP (Trivial File Transfer Protocol)
24. A valid MAC (Media Access Control) address is how many bytes long?
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
6
Check the connection from the WAP (Wireless Access Point) to the network
A. 18 -000 feet (5 -486.4 meters)
25. What part of an Ethernet MAC (Media Access Control) address designates the manufacturer of the NIC (Network Interface Card)?
Access Control List
Fully Qualified Domain Name
10 GBASE-LR
bytes 1-3
26. A network has been set up for DHCP (Dynamic Host Configuration Protocol) services using a PDC (Primary Domain Controller) and BDC (Backup Domain Controller) each with a range of 192.168.0.1 to192.168.0.254 using a class subnet of 255.255.255.0. DHCP
Split the scope addresses between the servers assigning 192.168.0.1 through 192.168.0.127 for the PDC (Primary Domain Controller) and 192.168.0.128 through 192.168.0.254 for the BDC (Backup Domain Controller).
TFTP (Trivial File Transfer Protocol)
DNS (Domain Name Service) server settings
Industry Standards Organization
27. List the benefits of a star topology
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
28. A technician just installed a new NIC (Network Interface Card) in a computer and attached a cable to connect the computer to a hub. Assuming the NIC (Network Interface Card) is functioning correctly and the network is up - which of the following will
The amber light is flashing occasionally and the green light is lit steadily.
TCP / IP (Transmission Control Protocol / Internet Protocol)
nslookup
User Datagram Protocol. This protocol is connectionless and routable.
29. MAN Means...
Metropolitan Area Network
Hypertext transfer protocol over secure sockets layer.
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Wired Equivalent Privacy
30. POP Means...
Post Office Protocol
Secure Sockets Layer
T1 (T-Carrier Level 1).
CSU / DSU (Channel Service Unit / Data Service Unit)
31. List the drawbacks of a ring topology
Forward the packets to all ports except the one that originated the request
There will be no Internet access.
Not scalable - Expensive - Difficult to reconfigure - move - or change - Not fault tolerant
An old microwave oven is being used in the break room which causes interference with the access point.
32. A facility designed to receive computer equipment during a disaster recovery is known as a...
New stations can be added easily and quickly - Scalable - Easier to troubleshoot - A single cable failure doesn't disable entire network
Network Access Control
Point to Point Tunneling Protocol
cold site.
33. IPSEC means...
40 bit - 128 bit - 64 bit
Internet Protocol Security
Point-to-Point Protocol
cold site.
34. IIS Means...
PPTP (Point-to-Point Tunneling Protocol)
Internet Information Services
802.2
Central Processing unit
35. Which one of the following will interfere with an IEEE (Institute of Electrical and Electronics Engineers) 802.11b access point?
Network Access Control
D. Switch and bridge
Packets from entering and leaving a network
Bluetooth enabled cell phones
36. A workstation presents an error message to a user. The message states that 'Duplicate IP (Internet Protocol) has been detected on the network.' After establishing what has changed in the network - what should be the NEXT step using the standard troub
Bridge
Network Time Protocol
A long length of antenna extension cable
Select the most probable cause
37. Which of the following choices describes an RJ-45 (Registered Jack) connector?
An eight-position connector which uses UTP (Unshielded Twisted Pair).
Public Switched Telephone Network
Secure Shell
Transmission Control Protocol
38. What is on Port 443?
HTTPS/ SSL
nslookup
It is an address assigned to a NIC (Network Interface Card).
Bluetooth enabled cell phones
39. Which one of the following options is required for a client workstation to connect to a network resource?
Local Area Network
Client - protocol - and adapter
Asynchronous Transfer Mode
Bayonet-Neill-Concelman or British Naval Connector
40. LDAP means...
File Transfer Protocol
Enable infrastructure mode and obtain the IP (Internet Protocol) address automatically on all clients
Lightweight Directory Access Protocol
POP3
41. Which fiber connector looks similar to an RJ-45 (Registered Jack) connector and connects two strands of fiber?
T1 (T-Carrier Level 1).
MT-RJ (Mechanical Transfer-Registered Jack)
LDAP - Active Directory (Windows) - e-Directory (Novell) - Open Directory (Apple)
Implement VLANs (Virtual Local Area Network)
42. Application Server
172.192.4.256
Manages network applications
Plain Old Telephone Service
TCP / IP (Transmission Control Protocol / Internet Protocol)
43. Proxy Server
In a locked room in an offsite location
Handles tasks in the place of other machines on the network
Routing Information Protocol
Connect Workstation 6 and Workstation 2 using a barrel connector
44. What is OSPF?
File Transfer Protocol
Open Source Path First - this is a routing protocol
NFS (Network File System)
Proxy Server
45. File Server
Stores and dispenses files
169.254.1.1
Easy to install - Inexpensive - Less actual cable required
1433
46. LAN Local Area Network
Periodically (randomly) blinking
Usually restricted to spanning a particular geographic location such as an office building - a single department within a corporate office - or even a home office)
Extranet
Bridge
47. NetBIOS Means...
Networked Basic Input/Output System
Manages network applications
Primary Rate Interface
User Datagram Protocol. This protocol is connectionless and routable.
48. A network technician is troubleshooting a remote home users computer that is behind a SOHO (Small Office / Home Office) router running NAT (Network Address Translation). The technician wants to ping the IP (Internet Protocol) address of the remote us
Point to Point Tunneling Protocol
Lightweight Extensible Authentication Protocol. This is a Cisco proprietary solution.
1000BASE-CX
This IP (Internet Protocol) address cannot be pinged remotely.
49. A firewall differs from a proxy server in that a proxy server operates at which of the following levels of the OSI (Open Systems Interconnect) model?
They are connected to a switch when trying to capture packets.
53
BootP (Boot Protocol)
Application
50. A user is booting a workstation and suddenly receives a message stating that a duplicate IP (Internet Protocol) address is in use on the network. Which of the following commands can be used to troubleshoot the problem?
48 bits.
rp
Bluetooth enabled cell phones
There are too many collisions occurring in traffic. Disconnect each network card individually to find and replace the one that is broadcasting.